Security

NSA Hit As Broadest Patriot Act Surveillance Powers Expire

The US Senate failed to reach a compromise in time to save key Patriot Act surveillance powers

9 years ago

Silk Road’s Ulbricht Gets Life Sentence

The judge argued Silk Road was run as a profitable criminal enterprise that expanded the market for dangerous drugs

9 years ago

Protecting People Is Key To Protecting Data In The Public Sector

Iron Mountain's Phil Greenwood explains how protecting people is vital to protecting vulnerable data within the public sector

9 years ago

North Korean Hackers Can Kill, Claims Defector

North Korea spends up to 20 percent of its military budget honing its cyber-attack capabilities

9 years ago

Queen’s Speech Confirms Return Of Snoopers’ Charter

Government confirms sweeping new powers for the security services in fresh blow to privacy campaigners

9 years ago

The Digital Art Of Secure Access

How UserLock enables the School of Engineering & Digital Arts, University of Kent, to provide secure 24-hour access to computer…

9 years ago

15,000 Spam Emails Hit Android Devices With FBI Porn Warning

Ukranian ransomware demands up to $1,500 to unlock victims' devices

9 years ago

Government Online Porn Policy Faces European Hurdle

British measures to block porn on computers and mobile devices by default faces European challenge

9 years ago

iOS Bug Crashes Your iPhone With One Text

iPhones will restart following SMS containing Arabic text, user reports say

9 years ago

Google Changes Up Play Store App Rating System

Android developers will not longer be able to self certify the age rating of their apps as part of an…

9 years ago

NSA Tests Smartphone Handwriting ID Tech

Fact or fiction? Can your smartphone identify you just by the way you type on the keyboard?

9 years ago

UK Government Ends Extended Support For Windows XP

Government opts not to renew extended support agreement for Windows XP, as migration continues

9 years ago

Three Security Problems The IoT Will Create — And How To Solve Them

Arxan Technology director Jonathan Carter explains how you can protect against IoT threats

9 years ago

Top 5 Tips For Keeping Hackers At Bay

Wherever you are, be safer from hackers with these top tips from Sophos

9 years ago

Fake Minecraft Scam Apps Downloaded Up To 2.8m Times

Researchers find more than 30 'Minecraft cheat' apps that attempt to trick users into subscribing to premium rate SMS services

9 years ago

Android Smartphone Factory Resets Leave Data Exposed

A new Cambridge study has found that user data is routinely retrievable from second-hand Android devices that have been wiped…

9 years ago

Adult FriendFinder User Details Hacked

Adult FriendFinder has called in police after being informed of the leak of millions of users' personal details, including those…

9 years ago

Criminals Target Windows Live ID Accounts

New scam uses Windows Live ID as bait to catch personal information stored in user profiles on services like Xbox…

9 years ago

Consumer Trust Meltdown With Businesses Over Personal Data

Porkie pie time...study finds consumers deliberately provide wrong information when businesses ask for personal details

9 years ago

Sophos – IT Skills Gap Is ‘Leaving The Door Open’ For Criminals

Sophos’ John Shaw tells TechWeekEurope why government agencies need to sharpen up their defences

9 years ago

LogJam Vulnerability Exposes Encryption Fears

Not again! Another legacy encryption flaw could explain how the NSA and co cracked encrypted communications

9 years ago

IBM Boosts Cyber Defence With Threat-Sharing Initiative

It's good to talk - IBM initiative aims to help companies share their cyber security experiences

9 years ago

Mspy Admits Blackmail Attack, Denies Data Breach

Child monitoring firm denies massive data leak but admits that it was approached by blackmailers

9 years ago

DDoS Attacks Double In A Year As Akamai Warns Of Future IPv6 Threat

Akamai says attackers are changing tactics with DDoS now lasting longer but using less bandwidth

9 years ago

NetUSB Flaw Exposes Millions Of Routers

Newly uncovered legacy vulnerability could put millions of routers at risk

9 years ago

Managing The Threat Of Privileged Account Misuse

Employee training and accountability are two of the most important tools in decreasing internal risk, says Zoltán Györkő, CEO at…

9 years ago

Telstra, Pacnet Hack Like ‘Crashing New Car’

Telstra executives were only told about Pacnet security breach after their purchase of the firm was complete

9 years ago

Financial Firms ‘Take Up To Three Months’ To Detect Cybersecurity Threats

Retailers fare even worse, taking up to six months to identify threats, Arbor Networks survey finds

9 years ago

Security System Cons Hackers By Dishing Out Fake Passwords

The ErsatzPasswords system lets you know when an attempted hack takes place - and tells you what the attacker was…

9 years ago

Look Out – Cybercriminals Are Getting Smarter, Says Trend Micro

Hackers launching a increasing mix of old and new style attacks, Trend Micro survey finds

9 years ago