Security

Majority of email users can't detect phishing scams, warns McAfee

Figures on a keyboard representing phishing
In tests, 79 per cent of users failed to detect at least one phishing attempt
04 Sep 2014

iCloud hack: Photo theft due to stolen log-in details, not iCloud security issue, claims Apple

Security threats - password theft
Naked photos 'leaked' because celebrity usernames and passwords were figured out, say Apple
03 Sep 2014

FBI to investigate celebrity iCloud hack as attackers promise more releases

fbi
US authorities brought in to investigate hack on celebrities' Apple iCloud accounts
02 Sep 2014

Microsoft fights back against US warrant demanding overseas emails be handed over

Microsoft resists US search warrant demanding data held in data centre in Ireland
01 Sep 2014

East Midlands Ambulance Service NHS Trust loses data cartridge with 42,000 patient forms

ICO, Nottinghamshire Police and NHS organisations have all been notified, says trust's chief executive
01 Sep 2014

Weekend protest at GCHQ over mass surveillance

Three-day protest by supporters of civil liberties groups opposing GCHQ's surveillance powers
29 Aug 2014

Insurers to demand more data via telematics to fine-tune insurance prices, says AXA CIO

AXA CIO Kevin Murray reveals how telematics devices, in-car and in-home, will increasingly help to set insurance premiums
29 Aug 2014

Former US government cyber security chief used Tor to trawl for paedophile images

FBI put malware onto websites only accessible on Tor to identify and track criminals using Tor
28 Aug 2014

FBI probes Russian government links to JPMorgan cyber attacks

State-sponsored response to political situation being 'investigated' by FBI
28 Aug 2014

Gmail can be hacked with 92 per cent success rate, says University of California

Hotels.com, Amazon, Chasebank apps all also at high risk according to research
26 Aug 2014

Backbytes: Whatever you’re doing, it’s probably against the law

Met Police make laws up as they go along
26 Aug 2014

Ministry of Justice fined £180,000 after prison didn’t realise encryption had to be turned on

MoJ ineptitude 'beggars belief', says ICO, after it is fined again for mishandling prisoner data
26 Aug 2014

NSA built 'Google-like' search tool to mine data from 850 billion communications records

Latest Snowden leak reveals how ICREACH is used to give US intelligence agencies access to communications data
26 Aug 2014

Sony's PlayStation Network hit by DDoS attack

No evidence of personal information being accessed or any intrusion into the network, claims Sony
26 Aug 2014

GCHQ and NSA security staff tip-off Tor developers over bugs

NSA and GCHQ staff are routinely tipping off Tor over bugs the security agencies are trying to exploit
22 Aug 2014

Car maker Tesla seeks 30 full-time hackers to break into its cars

Best job ever? Crack a Tesla Model S and it could be yours
21 Aug 2014

US Nuclear Regulatory Commission hacked three times

Spearphishing and malware used by 'foreign' attackers in presumed attempts to steal nuclear secrets
20 Aug 2014

GCHQ port scans 32 countries to find servers it can hack and use in attacks

GCHQ's 'Hacienda' programme to find insecure servers it can compromise - and from which it can conduct attacks
19 Aug 2014

Tesco Hudl and other Android devices contain ‘factory reset’ data retention flaw

Firmware error is to blame, say security experts
18 Aug 2014

The internet runs out of memory, and the unhackable is hacked: Top 10 IT news stories of the week

On the flipside, the NHS is grabbing some excellent IT budget-saving opportunities as NPfIT is laid to rest
15 Aug 2014

One-fifth of work PCs harbour malware – study

Malware-infested PCs down to company policies, claims security software company
14 Aug 2014

US construction company sues bank over cyber-heist

TEC Industrial sues TriSummit Bank after cyberheist perpetrated by gang based in Eastern Europe
14 Aug 2014

Backbytes: Unhackable Blackphone, err, hacked

$829 'secure' smartphone rooted in five-minutes flat at DefCon security conference
12 Aug 2014

Oracle database 'redaction feature' easily un-redacted, claims researcher

No fancy exploit code required, just a good working knowledge of SQL, claims David Litchfield at Defcon 22
11 Aug 2014