The government's phone hacking inquiry looks set to reopen, prompting an examination of MPs' phone security
News Security
ACS:Law ‘Drops All File-Sharing Cases’
Andrew Crossley has told a court that his law firm, ACS:Law, has dropped its pursuit of file-sharers due to threats
Hackers Sell Government Websites For Just £300
Dozens of military and government websites have been hacked and are up for sale for just over £300
Getting To Grips With Data Classification
Data classification has to be done, so where do you start, where do you stop and what do you do the in the meantime? Credant's Sean Glynn explains.
New Smartphone App Could Root Out Paedophiles
A new mobile phone application developed at Lancaster University can spot adults pretending to be children
Lush Admits Delay In Reporting Site Hack
Lush delayed notifying customers of its website hack for nearly a month while it conducted an investigation
Intel-McAfee Deal To Get EU Blessing Next Week
European regulators are reportedly ready to approve the acquisition of McAfee after Intel's concessions
eWEEK Readers Doubt Government Cloud
You doubt the wisdom of government data in the cloud. Next up, social networking: friend or foe?
Europe Calls For Tougher IP Laws
The European Commission believes that its own laws to combat online piracy are not tough enough
European Carbon Exchange Closed After £6m Theft
Virtual bank robbers stole €7 million in carbon credits, breaking the green exchange
Trojan Blocks Windows Connection To Cloud Antivirus
The Bohu Trojan has been seen in China by Microsoft attempting to block cloud-based anti-virus products
Cisco’s Wireless Security Goes Beyond PCI Compliance
Cisco has launched wireless security that exceeds current, and possibly future, PCI-DSS requirements
Social Network Scams: Biggest Security Threat For 2011
Facebook may not be up to the job of securing its service, or may not care, warns Graham Cluley of Sophos
ACS:Law File-Sharing Fiasco Astonishes Judge
Trying to drop file sharing cases, ACS:Law has got itself in a worse tangle
Toolkits Add Impact To The Cyber-Underground
Exploit kits form a vital part of the black cyber-economy and make malware campaigns easier for attackers
Researcher Hacks Smartphone Radio Chips
At Black Hat a researcher is to demonstrate a technique for hacking into the baseband processors that power smartphone radios
Facebook Disables Phone Number Sharing
Facebook has 'temporarily' disabled a feature that allows phone number and address sharing, following criticism
Can The Government Prevent A DDoS Attack On Its Systems?
Governments are not immune to DDoS attacks, as hacktivist group Anonymous has proved. It's time nations started defending themselves, says Will Hogan
Sarah Palin Email Hacker Sent To Prison
The man who hacked into Sarah Palin's email account has been sent to prison instead of a halfway house
ENISA Recommends Private Cloud For Public Sector
The public sector has been warned that private clouds remain the best option because of governance issues
What Do Facebook Users Gain From Sharing Data?
Facebook claims that users will benefit from sharing their contact details with developers. Pull the other one, says Sophie Curtis
Facebook Says Users Have Privacy Control
Sharing contact details is all about improving user experience, says Facebook
Sixth Formers Win Cyber Security Challenge Prize
The team stage of the contest has found winners including a group of sixth-formers
Does Virtualisation Break Compliance?
Companies face increasingly stiff regulations for their IT. Peter Judge asks - if you virtualise your servers, will you fall foul of compliance rules?
Coordinated Cyber-Attack Could Create ‘Perfect Storm’
A war fought entirely in cyberspace is unlikely but governments must boost their defences, says the OECD
Critics Bash Facebook For Sharing Phone Numbers
Rogue apps will be able to harvest contact details shared by Facebook, warn experts
Attackers Target Pentagon Credit Union
A hacked laptop has been used to breach the defences of a bank used by the US military
Expert To Reveal Data Theft Secrets
A security expert will use the upcoming Black Hat conference to reveal methods of sneaking data out of enterprises
RIM To Offer Cloud-Based BlackBerry Enterprise Server
Small businesses will be able to use an encrypted email system when RIM launches a cloud version of BES
Researcher Uses Amazon To Hack Wi-Fi Network
A security reseacher has revealed how he used Amazon's cloud service to hack into his neighbour's Wi-Fi network