Security

Enterprise Mobility Summit 2014: BYOD? Very soon you may have to...

Business man using smartphone as part of bring your own device trend
Companies looking to get out of hardware entirely, claims Moka 5's Kimber Spradlin
16 Jun 2014

Enterprise Mobility Summit 2014: Complete MDM solutions 'will not be available from any single vendor' says BlueCat CTO

andrewwertkin
'There's something fundamentally wrong with the market definition' says Wertkin
13 Jun 2014

Tweetdeck 'hack': rudimentary, but still widely shared

Twitter logo
The XSS vulnerability in Tweetdeck showed just how easily scripts can be run on user devices from a simple security flaw.
12 Jun 2014

Security industry advice for battling Turing Test-beating AIs: 'Be nice and sceptical'

Symantec and Juniper admit there is not yet a clear plan for beating more advanced forms of 'Eugene Goostman'
11 Jun 2014

Bank of England launches cyber test scheme for UK financial services providers

CBEST is aimed at improving financial firms' understanding of cyber attacks that could threaten the UK's financial stability
10 Jun 2014

Backbytes: RTFM - How two teenagers hacked Bank of Montreal ATMs

'Go away. This ATM has been hacked'
10 Jun 2014

McAfee: £300bn annual global cost of cyber crime

'Groups have repeatedly shown that they can overcome almost any cyber defence,' admits McAfee
10 Jun 2014

Google must prevent illegal access to our content, says News Corp

Phone-hacking media giant unhappy about with Google search algorithms that let downloaders 'steal' its TV shows
09 Jun 2014

Europol cybercrime head: International public-private collaboration 'the one true way' to stop cyber criminals

Paul Gillen, head of operations for Europol's European Cybercrime Centre, tells Computing that the likes of Operation Tovar can only be successful if they're international in scope
09 Jun 2014

Call for more specialist code reviewers after new OpenSSL vulnerability found

University of Ulster's Kevin Curran tells Computing that code reviewers need to think like hackers
06 Jun 2014

Vodafone transparency report reveals extent of government surveillance

Spy agencies in six countries have direct access to phone operators' networks, admits Vodafone
06 Jun 2014

Government launches Cyber Essentials Scheme

CESG and CREST to work together to vet public-sector suppliers
05 Jun 2014

European governments targeted by 'Molerats' cyber-crime gang

BBC and a major financial institution also attacked with 'spear phishing' emails
03 Jun 2014

National Crime Agency issues warning over GOZeuS and CryptoLocker malware

P2P network that controls banking Trojan taken down in action led by FBI
03 Jun 2014

NSA building database of photos for facial recognition project

Photos drawn from online sources, such as Facebook and other social media
02 Jun 2014

Flaws in 999-emergency calling system software exposes sensitive calls to hackers

Multiple flaws in NICE Systems software and MySQL database could be exploited by hackers, warns security company
31 May 2014

NHS cyber security 'suffers from lack of data ownership'

Coventry University's Dr Siraj Ahmed Shaikh responds to report Criticising cyber security in healthcare
30 May 2014

ICO slams Council's 'startling' data security policy, threatens court order

Information Commissioner issues enforcement order which if not upheld will result in court action
30 May 2014

World's largest companies recruiting CISOs for board-level roles

CISOs move up in the world with a place on the board and a $500k annual wage
30 May 2014

Google web form offers EU citizens first step in 'right to be forgotten'

Search giant allows EU citizens to request removal of search results, but with no promises of action
30 May 2014

Security experts' surprise over report claiming healthcare 'lags behind' in cyber security

Mimecast and Trustwave question claims made in report by risk start-up BitSight
29 May 2014

Panda: Trojans account for three-quarters of all malware

Anti-virus software vendor claims there's more malware than ever being made – and they all want to take control of users' PCs
29 May 2014

Shoe retail chain Office latest victim of security breach

CEO Brian McCluskey urges customers to change their passwords for Office as well as other accounts
29 May 2014

'Stop using TrueCrypt and migrate to something else,' say TrueCrypt developers

Mystery message on open source software's home page urges users to avoid the encryption tool
29 May 2014