Latest security articles

Backbytes: Black Hat to the NSA – 'Your name's not down, you're not coming in'

Spy
For some reason, the NSA has become less welcome at security conferences...
01 Aug 2014

GCHQ certifies six cyber security Master’s degree courses

Accepted stamp
Royal Holloway and Oxford universities' courses get full certification, while De Montfort misses out
01 Aug 2014

Tor developers rush to plug security hole that could identify users

eye-spy
Exploit developed by Carnegie Mellon University enables attackers to identify Tor users
31 Jul 2014

Internet of Things devices riddled with security errors, claims HP

HP Fortify study finds devices protected by weak passwords and unencrypted network services
30 Jul 2014

Backbytes: Russia offers FOUR MILLION RUBLES to unravel Tor

Russia's interior ministry offers to make ruble millionaires out of anyone who can crack Tor
28 Jul 2014

European Central Bank hacked and blackmailed in website attack

Web-facing events database downloaded by hackers - 'no market sensitive information' stolen, claims ECB
24 Jul 2014

Twenty-one arrested over e-tickets scam

Arrests in Spain, US, UK and Canada over e-tickets scam
24 Jul 2014

Russian-state malware used by cyber criminals in banking Trojans

Gyges, developed by Russian intelligence, is used in banking Trojans and 'ransomware'
21 Jul 2014

Backbytes: Fight! Fight! Fight!

Who's more secure, BlackBerry or Blackphone? There's only one way to find out...
17 Jul 2014

Botnet boom requires new laws to deal with it, argues US Justice Department

US assistant attorney general demands more far-reaching laws from Congress
17 Jul 2014

Government surveillance bill passed 438-51 in the House of Commons

Controversial Data Retention and Investigatory Powers Bill passed by MPs
16 Jul 2014

Backbytes: I have seen the future - it's a Triumph Adler typewriter

First the Russians, now the Germans
16 Jul 2014

US critical infrastructure unprepared for cyber attack - report

Survey from Unisys and the Ponemon Institute indicates patchy preparedness of cyber attack
15 Jul 2014

Shylock banking Trojan network targeted UK users

Eastern European-based gang targeted UK banks in fraud that netted millions
15 Jul 2014

US charges three over high-tech industrial espionage

Finger pointed at China over theft of military technology secrets by hackers
14 Jul 2014

Freed at last: Microsoft claims to have 'liberated' 4.7 million infected PCs

Microsoft cracks another malware gang as evidence emerges that Gameover ZeuS botnet is being reassembled
11 Jul 2014

Chinese hackers crack networks of US agency handling security clearances

No personal information stolen, claims Department of Homeland Security
10 Jul 2014

What makes the ideal security analyst?

QA Training's Mark Amory explains what skills are necessary for a security analyst in order to deal with people, processes and technology
02 Jul 2014

No more castle building - enterprise security and risk management

Research for Enterprise Security & Risk Management Summit 2014 finds IT moving away from a protect-at-all-costs mentality
01 Jul 2014

Enterprise Security and Risk Management Summit 2014 Live!

The latest news and views from Computing's summit held in Hilton Tower Bridge
01 Jul 2014

Google adds camera surveillance to Nest – amid a flurry of acquisitions

Dropcam adds video surveillance to Nest digital thermostats, while beefing up DoubleClick advertising and next-generation wireless
23 Jun 2014

Morgan Stanley: We deal with 'rogue IT' by blocking Amazon, Dropbox and other cloud services

Morgan Stanley cloud chief Laszlo Kollar takes drastic action to keep unwanted cloud services out of the bank's network
19 Jun 2014

What makes the ideal security engineer?

QA's Mark Amory highlights the key qualities that firms are looking for in a security engineer
16 Jun 2014

Backbytes: RTFM - How two teenagers hacked Bank of Montreal ATMs

'Go away. This ATM has been hacked'
10 Jun 2014