Blockchain could be used to give citizens control over how their identity information is shared with public services, argues the Reform think tank
News security
NHS Boosts Cybersecurity With Ethical Hackers, Real Time Monitoring & SMS Alerts
NHS Digital plots £20m division to help stop another WannaCry attack
Imgur Breach Exposes Emails, Passwords Of 1.7 Million Users
The passwords were encrypted but may have been cracked using brute-force techniques, says Imgur's chief operating officer
IT LIFE: James Kretchmar, Akamai EMEA CTO
Akamai CTO talks us through IPv6, the Apollo Lunar Module and why he would study foreign languages if he wasn't in tech
Tech Quiz: Uber, Its Innovations And Controversies
What do you know about Uber, its history and its services?
‘Concerned’ UK Regulators Look Into Uber’s Hidden Data Breach
ICO and NCSC are looking into the scale of the Uber hack before they take next steps
Google Has Been ‘Tracking’ Android User Locations
Search engine collects location data on Android users, even when location services are switched off
‘Hundreds’ Of Websites Track User Keystrokes
Is it legal? Hundreds of websites are said to be tracking visitor keystrokes raising questions of legality
Security Panel: What On Earth Was Uber Thinking?
Security experts are astounded at revelations that Uber concealed a cyberattack but what can businesses learn from it?
US Government Warns Businesses Over Intel Management Engine Flaw
Business PCs from Dell, Lenovo, HP and others contain flawed software that shipped with Intel processors
Uber ‘Hid’ Hack That Saw 58m Users And Drivers’ Data Stolen
New Uber CEO comes clean about 2016 hack, claiming data was destroyed and new measures implemented. But can users and drivers be sure?
New £5m Institute Opens In Northern Ireland To Investigate Hardware Security
Queens University Belfast to host £5m institute that looks to make hardware more secure in era of IoT
Interpol & Cisco To Combat Cyber Crime At Singapore Nerve Centre
Cisco is to contribute its world-spanning cyber-threat analysis to help battle increasingly sophisticated internet threats
Five Steps To Keep North Korean Hackers Out Of Your Network
ANALYSIS: You can’t prevent all attempts to penetrate your enterprise security, but you can impede the attackers and you can keep them from getting the data they want
AWS ‘Secret Region’ Serves US Government Customers
AWS re:Invent 2017: New government-focused region complements an existing deal that gives US intelligence agencies access to air-gapped cloud infrastructure
CA ‘Modern Software Factory’ Boosted By DevOps, Automation & Security Updates
CA WORLD 2017: CA releases 20 new products and enhancements as it preaches the power of change through software
BankBot Malware Slips Into Google Play Yet Again
The banking Trojan, which imitates real banking apps to steal users' login details, has been reported on Google Play several times this year
Harvard University Recommends How To Stop Election Hackers
The new Harvard programme is intended to put local and national election campaigns on guard against nation state hacking attacks
Silicon Readers Say Android Is The Dominant Mobile OS In The Workplace
Android is used by almost half of our readers at work and some people out there still use BlackBerry
IBM’s Schneier: It’s Time To Regulate IoT To Improve Cyber-Security
At the SecTor security conference, IBM Resilient Systems CTO Bruce Schneier makes a case for more regulatory oversight for software and IoT
GitHub Notifies Developers If Their Software Project Has A Security Issue
GitHub says move is an important step for open source security
IBM Quad9 DNS Service Offers Rogue Site Protection
Big Blue and partners deliver Quad9 DNS privacy and security service for malicious website protection
North Korea Getting Ready Wage A Global Cyber War, Experts Say
ANALYSIS: North Korea’s activities have changed in a way that may indicate it is gathering the information it needs launch a global cyber-attack
Cash Converters Admits Data Breach After Website Hack
Hackers access personal information on old website but credit card details haven't been exposed, says Cash Converters
Debate: Should We Be Concerned About IoT Security Or Not?
The consensus is that IoT is a security threat. But should we really be concerned?
Trump Clarifies US Government Rules For Cyber Security Flaw Disclosures
New rules governing how US agencies disclose cyber security flaws, as the FCC readies net neutrality reversal
Kaspersky Investigation ‘Proves’ Its Products Were Not Used In NSA Hack
Kaspersky publishes investigation findings that it says show its products were not used to stage assault which saw NSA code and files stolen
MIT Helping To Define New Model To Restore Trust In Cyber-Security
At the SecTor security conference, an MIT futurist details an open-source effort that aims to restore trust and improve data privacy for cyber-security
ESET Detects More Malicious Apps On Google Play
Not again. Google Play found to host malicious Android apps that seem legitimate, but install a mobile banking trojan
Patch Tuesday: Microsoft’s 53 Vulnerabilities Surpassed By Adobe Fixes
No zero-day vulnerabilities this month, but still a moderate number of patches from Microsoft