InTheSpotLight-security

Google Privacy Director Leaving As Global Probes Continue

Alma Whitten is leaving amidst various investigations into Google privacy practices

12 years ago

Bruce Schneier Is Wrong – There Is Hope For Internet Privacy

The security guy who has no vulnerabilities thinks there is no privacy left at all on the Internet - Tom…

12 years ago

The Epidemiology Of Malware

A nineteenth century doctor can tell you how to stop malware, says Dominic Storey

12 years ago

Will Companies Stop Paying For Security?

Will the cloud and consumer devices overturn the security market? We ask Christian Fredrikson

12 years ago

Meet 2013’s Cyber Security Challenge Champ

Cyber Security Challenge 2013 winner, Stephen Miller,tells us about his and the competition's future

12 years ago

RSA 2013: Hacking Team Defends Its Surveillance Software

Hacking Team's software was allegedly used by repressive regimes to track down citizens for torture. We ask their lawyer Eric…

12 years ago

RSA 2013: Juniper Is Cagey About Sharing Threat Data

Juniper's Nawaf Bitar will share threat data with RSA, but will he work with rivals? That's not nearly so sure....

12 years ago

RSA 2013: Context Is King

As perimeter defences fail, security experts are falling back on analytics. Tom Brewster says Big Data and context are hot…

12 years ago

US: Strike Back After China’s Cyber Pearl Harbor!

State-sponsored hackers from China have penetrated US institutions. Wayne Rash wants virtual blood

12 years ago

Brain Dead Security Unleashes Zombie Attack Hoax

US radio and TVs issued zombie attack warnings because of poor security. Wayne Rash wants more brains

12 years ago

Help Your Staff Avoid Spear Phishing!

Spear phishing is a major security risk, and the only way to stop it is to train your staff, says…

12 years ago

Richard III: We Have A Hunch His DNA Tests Could Affect Us All

They've identified Richard III from his DNA. Could they do the same to you, asks Andy Green of Varonis

12 years ago

Why Data Protection Day Is A Dismal Failure

Data Protection Day fails to inspire yet again - it's time for a different story, says Tom Brewster

12 years ago

Is It Time To Test Active Defence In Court?

If you are hit by a hacker, is it legal to hit back? Peter Judge thinks it's time to test…

12 years ago

Assange Spurts Protests Online Through His Little Package

Swiss artists give WikiLeaks founder Assange a chance to voice opinions on current affairs

12 years ago

Hit By Cyber Crime? Keep A Clear Head

Cyber crime isn't like ordinary crime says Seth Berman of Stroz Friedberg. Think before you report it

12 years ago

WikiLeaks Alleged Leaker Bradley Manning Faces Delayed Trial

Intelligence analyst Bradley Manning was not abused enough to have his case thrown out, says judge

12 years ago

John McAfee Goes From Defensive To Cyber Offensive

Man who created anti-virus giant turns cyber criminal?

12 years ago

The UK Was Ignored In ‘Egregious’ ITU Internet Treaty Talks

The UK was ignored by both UN member states and the ITU at this month's crucial meeting in Dubai. That's…

12 years ago

Gary McKinnon To Face No UK Charges But Fight With US Isn’t Over

CPS says if McKinnon is to go on trial, it should be in the US

12 years ago

Richard O’Dwyer TVShack Case Ends With A £20,000 Fine

The student returns to his normal life after a short trip to New York

12 years ago

Why 10GB Emails Are “Drive”-ing Fear Into The Hearts of Google’s Users

Not only does Google Drive lack in the security department, it is set to be a more dangerous place thanks…

12 years ago

David Petraeus Proves It: Email Is Not Secure

Wayne Rash asks: how could the head of the CIA not realise he couldn't trust secrets to Gmail?

12 years ago

The Rise Of Java Vulnerabilities

Ex-hacker Jacques Erasmus of Webroot, says careless users make Java an attractive prospect for criminals

12 years ago