IOActive CTO Gunter Ollman says research is uncovering a lot of interesting flaws on much-used chips
News InTheSpotLight-security
Want To Avoid NSA-Corrupted Crypto? Get Thee To The Geeks
The NSA may have ruined Internet security, but Silent Circle is leading the way in pushing non-standardised encryption. Tom Brewster says this is the way forward
Keeping The Internet Safe Is A Shared Responsibility
Everyone needs to work together to ensure Internet security, says AMD's CTO, Mark Papermaster
Users Must Take Charge Of Security In A Post-PRISM World
Sean Michael Kerner welcomes the User Data Manifesto, which says we should have control of of our own information
TechWeek Readers Want John McAfee To Run Microsoft
Who do you want to replace Steve Ballmer? Tech fugitive John McAfee, apparently
There Is No Way To Keep Your Data From The NSA
Even encryption won't stop the NSA. Wayne Rash warns of back doors in network adapters, which could siphon off data before it is encrypted.
New York Times Sowed Its Own Disaster
The Syrians hit the New York Times via Australia, but the newspaper had only itself to blame, says Sean Michael Kerner
Security: The Fine Line Between Disclosure And Violation
Apple and Facebook had to decide whether hackers had disclosed useful data, or violated their terms, says Sean Michael Kerner
For Better Security, Let’s Look Back To The Future
KPMG's Mark Waghorne looks at ways to prevent crooks from getting at data even if they make off with laptops, tablets and smartphones
If American Secure Email Services Close, Others Will Fill The Gap
We all have a right to privacy, says Sean Michael Kerner. With Lavabit and Silent Circle gone, someone else will provide
Security IS Fun! Hack A Toilet Or A Robot Rabbit!
If hacking toilets and a talking electronic rabbit doesn't get kids excited about IT security, then nothing will, says Tom Brewster
Edward Snowden Granted Temporary Asylum In Russia
After two months in legal limbo, the whistleblower finally leaves the Sheremetyevo airport in Moscow
Why Your CMS Is A Hacker’s Dream Come True
CMSs are easy to attack, but there are ways to at least try to fend off attackers, says Imperva's Barry Shteiman
Launching The Cyber Repression Series
Tom Brewster introduces a series of articles focusing on the plight of global activists in the face of mass cyber attacks and censorship
Merkel Gets Behind Controversial European Data Protection Reform
European Commission's polarising data protection reforms get a boost thanks to Edward Snowden
MIT Project Reveals What PRISM Knows About You
An MIT project shows Wayne Rash just how much information PRISM can get without opening a single email
Visual Tools Track Cyber Attacks In Real Time
~SEcurity staff are overwhelmed with data. Wayne Rash says we must use visualisation tools
Glitches Are More Dangerous Than Cyber Attacks
Iain Chidgey has some ideas on how to avoid human error
You Need To Manage Your SSH Keys
Manage your Secure Shell keys or suffer the consequences, says Tatu Ylönen, inventor of SSH
The Threat Facing The World’s Mobile Networks
Mobile operators don't know enough about threats facing their network and they aren't being proactive enough, says Arbor Networks' Tom Bienkowski
PRISM Is Unstoppable, And May Spread
You can't stop the PRISM snooping scheme, says Wayne Rash. And it could be applied for more than just hunting terrorists
Cameron Calls For Cross-Party Support On Communications Data Controversy
Tories and Labour look set to do battle with the Lib Dems over Snoopers' Charter
Kim Dotcom Granted Access To Megaupload Raid Evidence
Dotcom gets another boost in his fight against extradition to the US
Labour: War On Cyber Crime Will Need More Government Money
Labour shadow minister for defence Russell Brown tells TechWeek more funds will be required
Kim Dotcom Declares 3D-Printed Guns Scary, Removes Links From Mega
Just because Dotcom doesn’t like the US doesn’t mean he will support US anarchists
Google Glass Jailbreaker Warns Of Security Failures
Hackers could easily get spyware onto Glass devices, researcher warns
The EC Data Protection Proposals Will Be Costly And Complex
European data protection laws will be costly and frustrating, warn Sally Annereau and Debbie Heywood
The Cambridge Boffs Hoping To End Cyber Bank Heists
Cronto, a Cambridge University spin-out, believes it has a solution to the problem of banking malware
News International Frets Over Spear Phishing Bombardment
Following attacks on rival publishers, News International CISO Amar Singh talks about his spear phishing nightmares
How The Government Is Lying About Fighting The Database State
Exclusive: The Tories said they would end the database state, but ministers like Jeremy Hunt are doing the opposite