Latest security articles

EU swings behind David Cameron's encryption plan – as party grassroots voice opposition

cameron-laughing
Leaked EU document calls for government encryption controls, as demanded by Prime Minister David Cameron
23 Jan 2015

Oracle pushes record number of patches in latest security update - and urges users to apply them ASAP

Black Hat conference logo
169 security fixes for Oracle database, enterprise software and Java intended to fix critical vulnerabilities
22 Jan 2015

'Disable Adobe Flash now': popular browser plug-in at risk in zero-day security flaw

Firewall illustration
One week after Adobe fixed nine critical security flaws in Adobe Flash, a new exploit has emerged – and is already incorporated into exploit packs
22 Jan 2015

Retailers are facing up to severe threat posed by cyber security lapses, says top lawyer

Pinsent Masons partner and retail head Tom Leman claims that retailers are starting to face up to security threats
21 Jan 2015

Why Bet365 CIO Martin Davies isn’t chancing it with 'fashionable' technology

Davies doesn't believe DevOps, BYOD or a hybrid cloud suit the nature of the online gambling firm's business
21 Jan 2015

Google angers Microsoft (again) with another security flaw disclosure

Microsoft claims that Google's disclosures increase the risk of zero-day exploits
16 Jan 2015

Mass electronic surveillance doesn't work, warns Open University security lecturer

David Cameron's plan to make all internet communications readable slammed by IT security specialist
16 Jan 2015

Samsung to buy BlackBerry – report [update]

BlackBerry shares leap on rumour of buyout
14 Jan 2015

Security threats of connected medical devices

With 30 million people walking around with high-tech medical devices on them, Gary Newe, technical director F5 Networks, discusses just how safe they are
13 Jan 2015

Sony Pictures' internal network remains down following November's GoP attack

Sony claims hack hasn't affected operations at the film studio as staff go offline to get work done
12 Jan 2015

EU data protection regulations could be delayed until 2016

UK and business objections could put off implementation of new EU data protection rules
12 Jan 2015

Don't use WhiteHat's Aviator browser 'if you’re concerned about security and privacy', warns Google

But WhiteHat hits back at Google, stating that the firm exploits users' private data to make money
12 Jan 2015

Backbytes: Guess who's looking for security specialists? Why, Moonpig...

Embarrassingly hacked gift card site pulls advert seeking security staff
06 Jan 2015

Moonpig customers' personal details exposed in “simple API flaw” in Android mobile app

“There's no authentication at all,” blast security specialists as Moonpig takes down its mobile apps
06 Jan 2015

Apple fixes 'painfully obvious' new year security flaw in iCloud

Hacker releases exploit on Github to force Apple to patch iCloud security flaw
06 Jan 2015

Sony hackers: it's not the North Korean government, nor an insider, suggests security expert Bruce Schneier

Private emails from ordinary staff released by Sony hackers show why privacy is so important – Schneier
15 Dec 2014

Government: 'We want more people to develop cyber security skills'

Government knows more needs to be done to ensure UK citizens and businesses are protected against cyber crime
12 Dec 2014

Newly uncovered Linux Trojan represents 'missing piece' in four-year Turla malware attacked

Linux component of Turla Trojan could've been used in the wild for four years, warn Kaspersky and Symantec
09 Dec 2014

Intel acquires mobile identity management firm PasswordBox

Intel adds to security portfolio with Canadian digital identity company
02 Dec 2014

What exactly did security software companies know of Regin, the latest malware disclosed by Symantec this weekend?

H4cked off: Security software companies have some questions to answer about Regin, the latest state-sponsored malware that has been observed in the wild for at least six years
25 Nov 2014

In computer security, it's almost impossible to tell the 'good guys' from the 'bad guys'

Even the most sophisticated of cyber attacks invariably start with a banal email and a simple attachment or URL. But how should organisations start to protect themselves against such attacks?
25 Nov 2014

Stuxnet-style malware 'developed by Western intelligence agency' uncovered in Russia and Saudi Arabia

Symantec warns that many components of Regin probably 'remain undiscovered' and that 'additional functionality and versions may exist'
24 Nov 2014

Threat intelligence – the best form of defence?

Major organisations are subject to millions of 'security events' every week, but which ones should be ignored and which investigated? IBM argues that threat intelligence can help
17 Nov 2014

EU network and information security directive should focus on critical infrastructure, argues software industry lobbying group

Business Software Alliance argues that security directive needs to overcome patchy security across the EU
12 Nov 2014