Security

The internet runs out of memory, and the unhackable is hacked: Top 10 IT news stories of the week

Policeman in front of no entry sign
On the flipside, the NHS is grabbing some excellent IT budget-saving opportunities as NPfIT is laid to rest
15 Aug 2014

One-fifth of work PCs harbour malware – study

First Shellshock malware emerges
Malware-infested PCs down to company policies, claims security software company
14 Aug 2014

US construction company sues bank over cyber-heist

To catch a thief
TEC Industrial sues TriSummit Bank after cyberheist perpetrated by gang based in Eastern Europe
14 Aug 2014

Backbytes: Unhackable Blackphone, err, hacked

$829 'secure' smartphone rooted in five-minutes flat at DefCon security conference
12 Aug 2014

Oracle database 'redaction feature' easily un-redacted, claims researcher

No fancy exploit code required, just a good working knowledge of SQL, claims David Litchfield at Defcon 22
11 Aug 2014

Attacks on government systems in Eastern Europe, Middle East and Central Asia linked to Russian state

Flaws in Windows Server 2003 and Adobe Acrobat Reader opened doors to "Epic Turla" cyber-attackers
11 Aug 2014

Theft, breaches and ICO warnings: Top 10 IT news stories of the week

CIOs should be watching their backs after a particularly cybercrime-riddled seven days in IT
08 Aug 2014

Google plan to push sites to use HTTPS to prevent online surveillance

Google to prioritise sites using HTTPS in rankings – despite it being cracked by NSA and GCHQ
08 Aug 2014

One-third of GPs will opt patients out of care.data

Question marks over laws requiring GPs to hand over patient information for the care.data project
07 Aug 2014

Two new variants of Gameover Zeus banking Trojan identified

Two new Gameover Zeus variants targeting Europe and the US identified by Bitdefender
07 Aug 2014

Security specialist Sophos only employs two IT security pros

CIO Jason Richards: Companies don't need 'an army of security professionals'
07 Aug 2014

Target predicts staggering $148m loss over December security breach

US retailer to pay steep price after 40 million credit and debit card details were stolen in December 2013
07 Aug 2014

US Homeland Security contractor victim of 'state-sponsored' cyber attack

Information about government employees may have been stolen by hackers
07 Aug 2014

Backbytes: One billion passwords cracked! Pay $120 to find out if you're affected...

Is there really a Russian gang that has seemingly cracked 1.2 billion user names and passwords? Really???
06 Aug 2014

'Russian cyber gang' steals 4.5 billion usernames and passwords

'CyberVor' group holds at least 1.5 billion unique credentials in total says Hold Security
06 Aug 2014

ICO issues warning to law firms following string of data breaches

ICO issues warning following 15 security breaches at law firms in the past three months
06 Aug 2014

All 500,000 Cryptolocker victims can recover files for free

FireEye and Fox-IT team up to offer 'master decryption key' but not all files will be able to be decrypted
06 Aug 2014

Warning issued over 'Backoff' point-of-sale malware

'Backoff' point-of-sale malware not currently detected by anti-virus software
04 Aug 2014

CISOs ‘will take a keen interest in’ GCHQ-certified MSc cyber security courses

Candidates may be better differentiated in order to close cyber security skills gap, according to recruitment firm
01 Aug 2014

Backbytes: Black Hat to the NSA – 'Your name's not down, you're not coming in'

For some reason, the NSA has become less welcome at security conferences...
01 Aug 2014

‘Irresponsible and senseless’ Paddy Power says 650,000 users’ details were stolen in 2010

Online gambling firm waited four years to tell customers because it hadn't 'detected any suspicious activity' on customers' accounts
01 Aug 2014

GCHQ certifies six cyber security Master’s degree courses

Royal Holloway and Oxford universities' courses get full certification, while De Montfort misses out
01 Aug 2014

Tor developers rush to plug security hole that could identify users

Exploit developed by Carnegie Mellon University enables attackers to identify Tor users
31 Jul 2014

How is the role of the CISO evolving?

QA Training's Greg Newton-Ingham explains how the importance businesses place on thwarting cyber attacks has transformed the CISO role
30 Jul 2014