We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

More Security Articles

  • News: Google Drive problem is a public cloud problem, says privacy expert

    The bottom line for enterprises: Google Drive and cloud storage rivals are not the problem per se. The public cloud is neither private, secure.

  • News: ICO received 10,000 data protection complaints in 2011

    At the request of Computerworld UK the story headlined "ICO received 10,000 data protection complaints in 2011" and posted 04/25/2012 has been removed from the wire. Online editors are asked to immediately remove the story from Web sites and print editors are asked to not use the story in future editions. Questions regarding the story should be directed to John E Dunn, Security Editor, Techworld and Computerworld UK

  • News: Amazon outage one year later: Are we safer?

    Amazon Web Services last April suffered what many consider to be the worst cloud service outage to date - an event that knocked big name customers such as Reddit, Foursquare, HootSuite, Quora and others offline, some for as many as four days.

  • News: SOCA and FBI take down criminal websites

    Thirty-six websites used to sell stolen bank account details have been taken down following an investigation by the Serious Organised Crime Agency (SOCA).

  • News: Engineers ponder easier fix to dangerous Internet problem

    IT engineers are studying what may be an easier way to fix a long-existing weakness in the Internet's routing system that has the potential to cause major service outages and allow hackers to spy on data.

  • News: House passes CISPA cyberthreat sharing bill, despite privacy concerns

    The U.S. House of Representatives has passed a cyberthreat information-sharing bill that critics say will give U.S. government agencies access to the private communications of millions of Internet users

  • News: Security Experts Warn of Cyber Threats From Iran

    Cyber experts press for greater efforts on the part of civilian and military agencies to address threats from Iran, warning a joint House subcommittee that the Islamic Republic continues to expand its cyber arsenal.

  • News: SOCA and FBI take down criminal websites

    Thirty-six websites used to sell stolen bank account details have been taken down following an investigation by the Serious Organised Crime Agency (SOCA).

  • News: One in 10 second-hand hard drives in U.K. contain personal data

    Britain's Information Commissioner's Office has discovered that more than one in every ten second hand hard drives contains recoverable personal information of the original owner.

  • News: Facebook becomes antivirus reseller

    Facebook has teamed up with five security vendors to offer a range of free and subscription-based antivirus packages.

  • News: 'Obstinate' Conficker worm infests millions of PCs years later

    The long-suppressed Conficker botnet is still actively infecting millions of new machines, giving Windows enterprise users a two-and-a-half-year headache.

  • News: 3 Tips for Using the Social Engineering Toolkit

    Two years ago, Dave Kennedy, a penetration tester, social engineering expert and contributor to the website social-engineer.com, wanted to create a tool for pen testers to simulate social engineering attacks.

  • News: Most of the Internet's top 200,000 HTTPS websites are insecure, Trustworthy Internet Movement says

    Ninety percent of the Internet's top 200,000 HTTPS-enabled websites are vulnerable to known types of SSL (Secure Sockets Layer) attack, according to a report released Thursday by the Trustworthy Internet Movement (TIM), a nonprofit organization dedicated to solving Internet security, privacy and reliability problems.

  • News: 3 tips for using the Social Engineering Toolkit

    Two years ago, Dave Kennedy, a penetration tester, social engineering expert and contributor to the website social-engineer.com, wanted to create a tool for pen testers to simulate social engineering attacks.

  • News: InfoSec 2012: New online dashboard to monitor SSL quality

    The Trustworthy Internet Movement, a non-profit initiative formed in February to help address ongoing security issues on the internet, has unveiled its first project – an online dashboard called SSL Pulse that monitors the quality of SSL support across websites.

  • News: InfoSec 2012: One in 10 second-hand hard drives contain personal data

    The Information Commissioner’s Office has published a report revealing that one in ten second-hand hard drives sold online contains residual personal data, with some containing scanned bank statements, passports, information on previous driving offences, and medical details.

  • News: Free Tools to Wipe Your Drives Securely

    Your PC's hard drive is packed with your personal data. So when you want to get rid of your system or drive, you should permanently erase your storage device drives before you get rid of them. If your drives are encrypted and you trust the encryption protocol (full disk encryption is pretty safe), all you have to do is delete your encryption keys. If you want to safeguard your privacy further--and prevent data theft down the road--here are a few cheap and simple tools designed to wipe your hard drive, solid-state drive, or USB flash drive thoroughly before you dispose of it.

  • News: White House threatens veto of CISPA bill

    The White House today threatened a veto of the controversial Cyber Intelligence Sharing and Protection Act (CISPA) if the bill reaches President Obamas desk in its present form.

  • News: Privacy advocates slam Google Drive's privacy policies

    Privacy advocates and cloud services users are concerned about Google's terms of use for its new Drive storage services, saying Google can basically do what it wants with a customer's data.

  • News: Your Printer Could Be a Security Sore Spot

    Believe it or not, your network printer or copier could be a serious security liability. After all, theyoften handle very sensitive documents and information and could even be used to gain access to other computers on the network, so you won't want a hacker to get at it. It's time to take printer security seriously.


IDG UK Sites

Best camera phone of 2015: iPhone 6 Plus vs LG G4 vs Galaxy S6 vs One M9 vs Nexus 6

IDG UK Sites

In defence of BlackBerrys

IDG UK Sites

Why we should reserve judgement on Apple ditching Helvetica in OS X/iOS for the Apple Watch's San...

IDG UK Sites

Retina 3.3GHz iMac 27in preview: Apple cuts £400 of price of Retina iMac with new model