We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
79,018 News Articles

More Security News

  • News: Facebook denies keeping 'shadow profiles' of non-users

    Facebook has hit back at claims it creates 'Shadow profiles' of web users that have not signed up to the social network.

  • News: Obama Aims to Stop Federal Data Leaks

    President Obama has issued an executive order that aims to reform rules for the sharing and securing of data by federal agencies.

  • News: Got cyber insurance?

    Heartland Payment Systems figured it was in pretty good shape when it took out a $30 million cyber insurance policy. Unfortunately, the credit card transaction processor was the victim of a massive data breach in early 2009 that resulted in losses estimated at $145 million. The insurance company did pay Heartland the $30 million, but the company was on the hook for the remaining $115 million.

  • News: Widely used encryption standard is insecure, say experts

    A weakness in XML Encryption can be exploited to decrypt sensitive information, researchers say.

  • News: Government IT strategy promises much wider supplier market

    Intellect, the IT industry association, has welcomed the government’s promise in its updated IT strategy of involving more suppliers.

  • News: Hard to fully assess Duqu threat yet, researchers say

    As new information about the Duqu continues to come out, some experts are starting to question whether the danger from the trojan has been exaggerated.

  • News: Complete guide to FileVault 2 in Lion

    Encrypting your Mac's entire hard drive--making it unreadable to anyone who doesn't have the correct encryption key (a sort of software passcode)--is a perfectly marvelous idea to maintain the privacy of your data. However, Full Disk Encryption (FDE) should meet three criteria. First, you shouldn't have to manage a single setting--the encryption processes should be invisible and seamless while you use your computer. Second, the encryption has to be impregnable to unauthorized access. Third, using encryption should not slow down the computer's normal functions.

  • News: Security roundup for Oct. 21: Duqu for you; Google Apps in LA; researching smartphones

    Symantec last week was the first to get the word out about Duqu, the newly discovered network espionage malware designed to go after industrial control systems. It was quickly dubbed "Son of Stuxnet" by the media, and Symantec said 50% of the code base seems to be the same used in Stuxnet.

  • News: 49% of Brits think firms handle their data securely

    Just under half (49 percent) of consumers believe firms process their data in a fair and proper manner, says the Information Commissioner's Office (ICO.

  • News: Forget new threats: It's the old-school attacks that keep getting you

    Everybody in IT knows it is a dangerous world out there, filled with an endless variety of cyber attacks aimed at compromising and taking advantage of security flaws.

  • News: World's most sophisticated rootkit is being overhauled

    Experts from security vendor ESET warn that TDL4, one of the most sophisticated pieces of malware in the world, is being rewritten and improved for increased resilience to antivirus detection.

  • News: EU data watchdog slams planned database of alleged IP infringers

    The European Union’s data watchdog has attacked plans for a new Europe-wide database of alleged intellectual property infringers.

  • News: Researchers ID Skype users who also use BitTorrent

    Entertainment companies seeking to trace people who are illegally file sharing may be interested in new research that could identify filesharers through their Skype accounts. A research team has figured out how to link online Skype users to their activity on peer-to-peer networks, a correlation that could represent a major threat to users' privacy.

  • News: Ofcom: Illegal file-sharing warning letters to be issued in 2013

    Ofcom says illegal file-sharers will begin receiving warning letters regarding their online activities as early as summer 2013.

  • News: 2012 in Security: Rising Danger

    Computer security involves more than installing an antivirus utility on your PC. Malicious hackers are on a mission to steal money and wreak havoc, and they'll do it by any means possible. The growing number of mobile devices, such as phones and tablets, and the popularity of social networks give them new avenues in which to expand their cybercrime.

  • News: Focus11: Intel announces collaboration program with McAfee

    McAfee's parent company, Intel, is set to work on five areas of collaboration with the security vendor over the next five years, including securing mobile devices and improved Cloud security.

  • News: Despite Stuxnet, Duqu, control system flaws still overlooked

    Efforts to strengthen critical infrastructure targets continue to focus on front-end systems rather than on underlying industrial control systems where the real problems exist, security experts warned this week.

  • News: Researchers find way to tighten control over mobile device data

    For some time now, many security experts have argued that rather than focus efforts on locking down endpoints, the focus needs to be on keeping the data itself secure. Just last week, we covered a number of the findings from the Human Behavior and Security Culture workshop, held by the Tuck School of Business at Dartmouth. Those at the workshop discussed a Hotel California strategy to data protection -- enabling data to be checked out, but to never leave a prescribed area.

  • News: FAQ on Son of Stuxnet

    Duqu is primarily a remote-access Trojan targeted at a limited number of organizations in Europe, Africa and the Middle East to gather intelligence that can help plan a future attack.

  • News: Adobe to fix Flash flaw that allows webcam spying

    Adobe is working on a fix for a Flash Player vulnerability that can be exploited via clickjacking techniques to turn on people's webcams or microphones without their knowledge.



IDG UK Sites

7 coolest 3D-printed objects: Body parts, houses, camera lenses and even pizza

IDG UK Sites

iOS 8 review: Hands on with the iOS 8 beta

IDG UK Sites

Thinking robots: The philosophy of artificial intelligence and evolving technology

IDG UK Sites

Sharknado 2 VFX: how The Asylum created CG flying man-eating sharks