Firewall

Euro 2016: What Are The Biggest Security Threats?

Malware, social engineering and dodgy ticket sites. Here are the security threats you should be looking out for during Euro…

8 years ago

Infosec 2016: Shadow IT Lets Employees Take Company Data To New Jobs

Blue Coat research shows significant amounts of cloud use in firms is not sanctioned

8 years ago

Lessons From Mark Zuckerberg’s Social Networking Account Breach

ANALYSIS: Facebook founder and CEO Mark Zuckerberg made a mistake that many, perhaps most, people make and reused passwords for…

8 years ago

New Trojan Uses Zeus Tricks To Target Russian Banks

Dr Web researchers find new malware that can spread itself and avoid detection on Windows systems

8 years ago

Investigatory Powers Bill Given Cautious Support By Human Rights Committee

Journalist sources must be protected says committee of MPs, but admits bulk data collection can be justified

8 years ago

Visit TechWeekEurope At Infosec 2016 And Win An Apple Watch

TechWeekEurope will be at Europe's biggest cybersecurity event next week, speaking to the biggest names in the field and sharing…

8 years ago

Microsoft Boosts Office 365 Security With Threat Detection, Visibility Tools

Microsoft says Advanced Security Management can protect networks and make Office 365 deployments more effective with new dashboard

8 years ago

US Police Don’t Need A Warrant To Track Mobile Users

Privacy setback? US appeals court rules police don't need warrant to obtain cell tower records from mobile operators

8 years ago

Web Publishers Need To Address Reasons Why Readers Install Ad Blockers

ANALYSIS: Newspapers and Web sites of all kinds are fighting the use of ad blockers as a threat to their…

8 years ago

Security For Google’s New Home Assistant May Get Lost On The IoT

GOOGLE I/O 2016 ANALYSIS: Nobody knows what security is planned for Google Home smart assistant, but buyers need to think…

9 years ago

How To Maximise Data Protection In Today’s Threat Landscape

Peter Galvin, VP of strategy, Thales e-Security, offers a step by step guide on how security teams can ensure their…

9 years ago

Hacking Forum Hack Exposes 473,000 Members And 2.2m Posts

Nulled.IO forum used to sell credentials and cracks is itself hacked, potentially allowing law enforcement to solve other attacks

9 years ago

How Fuzzing Can Make A Large Open Source Project More Secure

Emily Ratliff of the Linux Foundation explains the considerations to take when planning to fuzz your open source project

9 years ago

Facebook Blocked From Taking Biometric Data From Users

California court rules that social media giant should not have access to personal details garnered from photographs

9 years ago

RSA: The World Is Not Ready For IoT

Security specialists at RSA have warned that too many companies have implemented IoT "security through obscurity"

9 years ago

Google Encrypts All Blogspot Domains With HTTPS

Google switches on Blogspot HTTPS by default, allowing admins and users an opportunity to encrypt their traffic

9 years ago

Microsoft Patches Office 365 Flaw That Exposed Files And Emails On Federated Accounts

Microsoft patches Office 365 vulnerability that had not been exploited in the wild despite its relative ease

9 years ago

The Struggle For Both Privacy And Security

Ian McEwan, VP EMEA, Egnyte, examines the difference between privacy and security, and how we can achieve both

9 years ago

Almost All Apps Have Flaws, Trustwave Study Finds

2016 Trustwave Global Security Report reveals shocking cybercrime trends

9 years ago

Box CEO Supports Apple In FBI Battle But Looks At Privacy Shield Alternatives

Box CEO Aaron Levie says there needs to be a discussion between the tech industry and authorities about digital regulation…

9 years ago

Biometrics Offers The ‘Perfect Balance’ Of Security And Usability

Biometrics technology has been around for a while, now it’s time to utilise it properly, Intelligent Environments CTO tells TechWeekEurope

9 years ago

Swipebuster Uses Open API To Identify Tinder Users

Tinder's privacy comes into question as new service lets people find out who is using the application

9 years ago

‘Crucial’ Badlock Vulnerability Affects Windows, Samba

Samba and Microsoft engineers have warned system administrators to expect a critical patch on 12 April

9 years ago

TechWeek Readers Back Authorities Over Apple In Encryption Battle

Poll: 54 percent of readers say law enforcement agencies should be able to access phone data - but most say…

9 years ago

FBI ‘Independently Cracks’ iPhone And Drops Case Against Apple

FBI announces it has accessed the locked iPhone belonging to the San Bernardino shooter, claiming it "no longer requires the…

9 years ago

Apple CEO Tim Cook: We Have A Responsibility To Fight For Privacy

Tim Cook thanks the public and other tech firms for their support in battle against the FBI over iPhone encryption

9 years ago

Hackers Target Swiss Railways, Political Parties And Retailers

A group called NSHC claims responsibility for SVP hack and SBB DDoS assault, but not a separate incident affecting

9 years ago

Vodafone Launches Enterprise Security Business

Vodafone will provide tools, services and advice to businesses as it seeks to take advantage of growing demand for security

9 years ago

How To Hack A Bank In 20 Minutes

Ryan MacDougall, senior security consultant at Coalfire, details the simple techniques he (hypothetically?) used to breach a major bank

9 years ago

Cisco: People Don’t Realise How Big We Are In Security

Cisco's European cybersecurity director says company can break down barriers to digitisation, simplify security processes and make the most of…

9 years ago