Dell confirms it installed certificate but says it was to help customer service, nohing malicious
News Authentification
Superfish-Like Rogue Certificates ‘Found Pre-installed’ On Dell PCs
A number of Dell users say they found self-signed root certificates on their laptops and want to know why and how they are installed, citing security fears
Amazon Adds Two Factor Authentication For Online Shopping
Users can now opt for two-factor authentication to help protect themselves against fraud
Nadella: Microsoft Is Uniquely Positioned To Combat Cyber Threats
Microsoft CEO Satya Nadella says cloud-first Microsoft's scope means it can help make IT more secure, but industry collaboration is needed
Biometrics – Where Technology And Storytelling Meet
Matthew Maxwell, associate creative director at marketing firm SapientNitro, discusses the art of identity technology
Shoppers Could Soon Use Their Veins To Authenticate Payments
Fingopay from Visa Europe Collab uses finger vein pattern authentication technology to provide more secure authentication
Government’s Investigatory Powers Bill To Require ISP Storage Of Browsing History
Return of Snoopers' Charter. ISPs will be required to store customer browsing history for 12 months
Is Your Password Up To The Challenge?
Lookout's Gert-Jan Schenk shares some of his top password tips
Bitdefender’s Mobile Security Protection Can Snap Thieves In The Act
Security firm also upgrades its mobile security platform to make it easier to access apps on multiple networks
In-App Ad Blocker Been Choice Returns To App Store
Been Choice is back on the App Store after Apple has an unexplained change of heart
Cybercrime Is Now Britain’s Most Common Criminal Offence
Inclusion of more than seven million cyber offences pushes British crime rate up 70 percent, ONS figures reveal
How Can You Deal With The Ransomware Epidemic?
Kaspersky Labs’ David Emm shares some of his top tips to ensure your business stays protected against ransomware
Worldpay Wants To Use Your Face To Stop Card Fraud
Facial recognition technology in new ‘PED Cam’ set to be used to combat crime
IT Security Spending To Reach £50bn, But Human Error Is Still Main Cause Of Data Loss
Spending on security set to grow, but pesky humans still main reason for data losses in organisations
More Than Five Million Fingerprints Stolen In US Government Hack
Office of Personnel Management hack stole over five million fingerprint records of US government staff
As A Society, We Don’t “Do” Passwords Well
Rob Coombs from ARM tells us some top tips to improve our use of passwords
Android Phones Can Be Unlocked By Super Long Passwords
Researchers discover they can crack Android devices just by typing nonsense into password field
IT Life: Safe And Sound
RiskIQ's Ben Harknett talks security, Elon Musk, tennis and more in our look at his IT Life
Telefónica Mobile Alerts To Prevent Fraud And Blocked Cards Abroad
‘Travel Alerts’ service created with TeleSign lets users verify their location with their mobile, avoiding fraud and inconvenience of blocked card
Dropbox Bulks Up Chrome Security With USB Two Factor Authentication
Dropbox now supports USB U2F two factor authentication to protect users from phishing during the login process
Dutch Bank Launches Voice-Activated Password System
ING Netherlands customers can now log in to their accounts simply by speaking
Fujitsu: IT Security ‘Needs To Be For Everyone’
Rob Norris tells TechWeekEurope why education could play a major role in providing the security specialists of the future
Mastercard Wants To Use Your Face To Pay For Things
New facial-scanning authentication security process hopes to launch later this year
Washington Post Tackles Snooping, Encrypts Webite
Major American news outlet encrypts website to protect readers from spies and hackers
More Than Half Of Passwords ‘Can Be Cracked In 24 Hours’
Trustwave Global Security Report shows shocking state of password security around the world
US Tech Firms Warn Obama To Back Off Encryption
Open letter to President Obama highlights tech opposition to efforts to weaken encryption systems
Knowledge Is Power To The Hacker
SecurEnvoy's Steve Watts tells us how hackers are gaining more and more power through unsecured knowledge access points
The Digital Art Of Secure Access
How UserLock enables the School of Engineering & Digital Arts, University of Kent, to provide secure 24-hour access to computer suites
NSA Tests Smartphone Handwriting ID Tech
Fact or fiction? Can your smartphone identify you just by the way you type on the keyboard?
LogJam Vulnerability Exposes Encryption Fears
Not again! Another legacy encryption flaw could explain how the NSA and co cracked encrypted communications