Latest Cyber Security articles

FBI probes Russian government links to JPMorgan cyber attacks

American
State-sponsored response to political situation being 'investigated' by FBI
28 Aug 2014

'Sony doesn't understand security': Why PlayStation Network is such an attractive target for hackers

ps4-screen
Sony’s poor reputation for security and the prestige of taking down a gaming giant attracts hackers
27 Aug 2014

GCHQ port scans 32 countries to find servers it can hack and use in attacks

GCHQ Cheltenham
GCHQ's 'Hacienda' programme to find insecure servers it can compromise - and from which it can conduct attacks
19 Aug 2014

Hacking back - tempting, but is it legal?

Sarah Pearce and Jane Elphick of law firm Edwards Wildman Palmer LLP discuss whether firms should explore hacking back, to stop and deter cyber attackers
18 Aug 2014

Tesco Hudl and other Android devices contain ‘factory reset’ data retention flaw

Firmware error is to blame, say security experts
18 Aug 2014

Attacks on government systems in Eastern Europe, Middle East and Central Asia linked to Russian state

Flaws in Windows Server 2003 and Adobe Acrobat Reader opened doors to "Epic Turla" cyber-attackers
11 Aug 2014

Theft, breaches and ICO warnings: Top 10 IT news stories of the week

CIOs should be watching their backs after a particularly cybercrime-riddled seven days in IT
08 Aug 2014

Two new variants of Gameover Zeus banking Trojan identified

Two new Gameover Zeus variants targeting Europe and the US identified by Bitdefender
07 Aug 2014

'Russian cyber gang' steals 4.5 billion usernames and passwords

'CyberVor' group holds at least 1.5 billion unique credentials in total says Hold Security
06 Aug 2014

CISOs ‘will take a keen interest in’ GCHQ-certified MSc cyber security courses

Candidates may be better differentiated in order to close cyber security skills gap, according to recruitment firm
01 Aug 2014

GCHQ certifies six cyber security Master’s degree courses

Royal Holloway and Oxford universities' courses get full certification, while De Montfort misses out
01 Aug 2014

The ethical dilemmas of big data

Organisations have adopted an 'analyse first, ask legal questions later' approach to big data projects, but more and more people are raising ethical objections
01 Aug 2014

Tor developers rush to plug security hole that could identify users

Exploit developed by Carnegie Mellon University enables attackers to identify Tor users
31 Jul 2014

How is the role of the CISO evolving?

QA Training's Greg Newton-Ingham explains how the importance businesses place on thwarting cyber attacks has transformed the CISO role
30 Jul 2014

Internet of Things devices riddled with security errors, claims HP

HP Fortify study finds devices protected by weak passwords and unencrypted network services
30 Jul 2014

Apple can extract personal data from iPhones without user's knowledge

Security researcher reveals practice previously unknown to the public that allows Apple to extract information including texts, photos and contact lists from iPhones
28 Jul 2014

European Central Bank hacked and blackmailed in website attack

Web-facing events database downloaded by hackers - 'no market sensitive information' stolen, claims ECB
24 Jul 2014

Twenty-one arrested over e-tickets scam

Arrests in Spain, US, UK and Canada over e-tickets scam
24 Jul 2014

Cyber espionage by Google Glass is the next major threat to enterprise security

Some organisations are already jumping onto the wearable technology bandwagon, but are they opening up a new way in for cyber criminals? Danny Palmer investigates.
23 Jul 2014

UK critical business applications more vulnerable to attack than those of US counterparts

Veracode report says many British firms are sitting targets for cyber criminals
22 Jul 2014

Russian-state malware used by cyber criminals in banking Trojans

Gyges, developed by Russian intelligence, is used in banking Trojans and 'ransomware'
21 Jul 2014

Small businesses convinced they won't be cyber attack targets have 'heads in the sand'

Britain's small businesses woefully under prepared to protect themselves against hackers, claims Kaspersky Labs
18 Jul 2014

Blackphone: BlackBerry 'compromised its integrity' in security years ago, and has no right to criticise us

Super-secure smartphone maker describes BlackBerry’s criticism as 'slinging mud'
17 Jul 2014

Botnet boom requires new laws to deal with it, argues US Justice Department

US assistant attorney general demands more far-reaching laws from Congress
17 Jul 2014