Security

Foxtons Probes ‘Leak’ Of 10k Customer Logins

Foxtons isn't offering comment on the possible leak, but has told customers it is investigating the matter

11 years ago

David Miranda ‘Forced To Hand Over Passwords’

Glenn Greenwald's partner and occasional assistant claims he was told to hand over passwords for social media and email accounts

11 years ago

Facebook’s Swings And Roundabouts

This week we've seen Facebook get security right and wrong, says Sean Michael Kerner

11 years ago

Hacker Claims Leak Of 15k Twitter Account Details

Twitter says it is looking into alleged account data published online

11 years ago

LinkedIn Welcomes Teens, Grown-Ups Despair

LinkedIn is to let 13-year-old teenagers run ravage on the site, and certain adult users aren't happy about their experience…

11 years ago

Zmap’s Fast Internet Scan Tool Could Spread Zero Days In Minutes

The 45-minute Internet scan could be a force for good... or evil

11 years ago

Groklaw Site To Close Over Email Surveillance Concerns

Open source community in shock as Groklaw closes because of concerns over email and Internet privacy

11 years ago

UK Government Smashed Guardian Drives In ‘Symbolic’ Bid To Stop Leaks

"Bizarre" moment as GCHQ experts oversee the destruction of hard drives

11 years ago

PHP Gets Security Updates

The widely deployed PHP language has been updated with two important patches fixing both security issues and stability bugs

11 years ago

IDC Sees Growth In Market For Advanced Threat Protection

Organisations are increasingly seeking products and services to protect themselves from targeted malware attacks, according to IDC

11 years ago

Microsoft Warns On Windows XP Security

Organisations running Windows XP face added security risks after the platform's support cutoff next year, according to Microsoft

11 years ago

KPMG: New Breed Of Cyber Attack Could Cripple Banks

British banks should watch out for fresh kinds of attacks as they can't afford to suffer another systemic shock, KPMG…

11 years ago

For Better Security, Let’s Look Back To The Future

KPMG's Mark Waghorne looks at ways to prevent crooks from getting at data even if they make off with laptops,…

11 years ago

Google: We Should Not Be Subject To British Privacy Law

Google said to have made claim in defending itself against circumvention of Apple Safari cookie protections

11 years ago

Lessons From The Washington Post’s Syrian Strike

The Syrian Electronic Army's attack on the Washington Post shows ad networks open up new threats, says Sean Michael Kerner

11 years ago

Researcher Hits Zuckerberg’s Wall To Report Facebook Bug

Facebook says researcher broke terms and conditions when proving an exploit

11 years ago

China To Probe EMC, IBM And Oracle Following US Spy Revelations

The PRISM fallout could hit US firms' operations in China

11 years ago

Germany Rules Bitcoin Is Money – And Subject To Tax

The German finance ministry says profits from Bitcoin transactions may be subject to 25 percent tax

11 years ago

Study: Enterprises Prefer Hybrid Cloud

A Rackspace-backed study has found a surprisingly high proportion of organisations prefer the hybrid cloud approach, partly due to security…

11 years ago

NSA ‘Broke Privacy Rules Almost 3,000 Times In A Year’

Agency breaks rules designed to keep its surveillance in check thousands of times, according to an audit leaked by Edward…

11 years ago

Met Police Moves In As Mobile Phone Thefts Hit 7000 A Month

Met Police launches campaign to raise awareness of the risk of mobile phone theft in London

11 years ago

Washington Post, CNN And Others Hit By Syrian Electronic Army

Hackers breach Outbrain feeds to spread their message across major media websites

11 years ago

Tibetans Under Cyber Attack – And The Security Industry Isn’t Helping

Tibetans are pummelled with cyber attacks, but the security industry is not helping, and may even be hindering, TechWeek hears

11 years ago

Fortinet Grows Application Delivery Portfolio

Fortinet has expanded its Application Delivery Portfolio thanks to its recent acquisitions

11 years ago

Microsoft Pulls Critical Exchange Patch

Hackers may now seek to exploit the flaw, despite a Microsoft workaround

11 years ago

Google Offers Fixes For Android Flaws Used To Steal Bitcoins

Google admits to flaws and sends out update code to manufacturers, but no timeline on when users will see the…

11 years ago

IBM To Acquire Israeli Fraud Detection Firm Trusteer

Big Blue planning a new security research lab in Tel-Aviv too

11 years ago

Google’s Stupid Sophistry Over Gmail Privacy

Google is using false reasoning to justify its scanning of Gmail messages, says Tom Brewster

11 years ago

TechWeek Readers Abandon US Cloud Over Privacy

Our readers don't trust US cloud providers any more, it seems

11 years ago

Crooks Use Google’s Own Cloud To Control Android Malware

Google's cloud is abused as part of attackers' command and control infrastructure

11 years ago