Latest Cyber security articles

Security warning over the Internet of Things

Internet of Things UK from above image
Lack of security built into the Internet of Things could be catastrophic, warn researchers
11 Sep 2014

Google Gmail users told to change passwords after five million accounts were compromised

email-authentication
Russian hackers release login names and passwords of five million Google Gmail users
11 Sep 2014

RBS among the Salesforce users targeted by 'Dyre' malware

Royal Bank of Scotland
Gang behind the Dyre Trojan believed to have been commissioned to target Salesforce users
09 Sep 2014

Global bank sanctions database at risk, warns former GCHQ security specialist

US-based database intended to help banks avoid breaching far-reaching US sanctions could be at risk of attack
08 Sep 2014

How to convince your boss to adopt the cloud? Remind them a 'galactically large' gang of bad guys is out to get them, suggests Steven Sinofsky

If you store credit card details on-premise that's the reality, says ex-Windows president
05 Sep 2014

Barclays unveils blood-reading authentication technology for corporate banking clients

'It’s very, very simple, yet it's very, very secure,' bank says of vein authentication technology
05 Sep 2014

Hacked JPMorgan data rerouted to Russia through network of computers

Cyber criminals could be using 'bulletproof' hosting platform, US bank investigators have suggested
04 Sep 2014

FBI probes Russian government links to JPMorgan cyber attacks

State-sponsored response to political situation being 'investigated' by FBI
28 Aug 2014

'Sony doesn't understand security': Why PlayStation Network is such an attractive target for hackers

Sony’s poor reputation for security and the prestige of taking down a gaming giant attracts hackers
27 Aug 2014

GCHQ port scans 32 countries to find servers it can hack and use in attacks

GCHQ's 'Hacienda' programme to find insecure servers it can compromise - and from which it can conduct attacks
19 Aug 2014

Hacking back - tempting, but is it legal?

Sarah Pearce and Jane Elphick of law firm Edwards Wildman Palmer LLP discuss whether firms should explore hacking back, to stop and deter cyber attackers
18 Aug 2014

Tesco Hudl and other Android devices contain ‘factory reset’ data retention flaw

Firmware error is to blame, say security experts
18 Aug 2014

Attacks on government systems in Eastern Europe, Middle East and Central Asia linked to Russian state

Flaws in Windows Server 2003 and Adobe Acrobat Reader opened doors to "Epic Turla" cyber-attackers
11 Aug 2014

Theft, breaches and ICO warnings: Top 10 IT news stories of the week

CIOs should be watching their backs after a particularly cybercrime-riddled seven days in IT
08 Aug 2014

Two new variants of Gameover Zeus banking Trojan identified

Two new Gameover Zeus variants targeting Europe and the US identified by Bitdefender
07 Aug 2014

'Russian cyber gang' steals 4.5 billion usernames and passwords

'CyberVor' group holds at least 1.5 billion unique credentials in total says Hold Security
06 Aug 2014

CISOs ‘will take a keen interest in’ GCHQ-certified MSc cyber security courses

Candidates may be better differentiated in order to close cyber security skills gap, according to recruitment firm
01 Aug 2014

GCHQ certifies six cyber security Master’s degree courses

Royal Holloway and Oxford universities' courses get full certification, while De Montfort misses out
01 Aug 2014

The ethical dilemmas of big data

Organisations have adopted an 'analyse first, ask legal questions later' approach to big data projects, but more and more people are raising ethical objections
01 Aug 2014

Tor developers rush to plug security hole that could identify users

Exploit developed by Carnegie Mellon University enables attackers to identify Tor users
31 Jul 2014

How is the role of the CISO evolving?

QA Training's Greg Newton-Ingham explains how the importance businesses place on thwarting cyber attacks has transformed the CISO role
30 Jul 2014

Internet of Things devices riddled with security errors, claims HP

HP Fortify study finds devices protected by weak passwords and unencrypted network services
30 Jul 2014

Apple can extract personal data from iPhones without user's knowledge

Security researcher reveals practice previously unknown to the public that allows Apple to extract information including texts, photos and contact lists from iPhones
28 Jul 2014

European Central Bank hacked and blackmailed in website attack

Web-facing events database downloaded by hackers - 'no market sensitive information' stolen, claims ECB
24 Jul 2014