Thursday 29 December 2016

Obama’s Russian Hacking Retaliation Is Biggest “Since the Cold War”

Obama’s Russian Hacking Retaliation Is Biggest “Since the Cold War”
The US will deport dozens of diplomats, and has named specific individuals implicated in the cyberattacks. The post Obama’s Russian Hacking Retaliation Is Biggest “Since the Cold War" appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/obama-russia-hacking-sanctions-diplomats/
from Tumblr http://zoehamilton671.tumblr.com/post/155134271150
via Zoe Hamilton

Top 10 HR technology stories of 2016

Here is a rundown of Computer Weekly’s most popular stories on HR technology in 2016

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404616/Top-10-HR-Stories-of-2016


from Tumblr http://zoehamilton671.tumblr.com/post/155112751125
via Zoe Hamilton

Sunday 25 December 2016

Where to Donate to Protect the Internet in 2017

Where to Donate to Protect the Internet in 2017
In uncertainty times, these non-profits need your year-end charity to protect privacy and civil liberties online. The post Where to Donate to Protect the Internet in 2017 appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/donate-protect-internet-2017/
from Tumblr http://zoehamilton671.tumblr.com/post/154933745585
via Zoe Hamilton

Friday 23 December 2016

Top 10 networking stories of 2016

A look back at Computer Weekly’s most-read networking stories of 2016

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404603/Top-10-networking-stories-of-2016


from Tumblr http://zoehamilton671.tumblr.com/post/154844673545
via Zoe Hamilton

Thursday 22 December 2016

The Most Dangerous People on the Internet in 2016

The Most Dangerous People on the Internet in 2016
It used to be people who disrupted the establishment. Now? It’s mostly the establishment. The post The Most Dangerous People on the Internet in 2016 appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/dangerous-people-internet-2016/
from Tumblr http://zoehamilton671.tumblr.com/post/154803909775
via Zoe Hamilton

Top 10 state surveillance, investigatory powers and activism stories of 2016

This year saw the UK introduce the Snoopers’ Charter, legalising some of the most extensive government surveillance powers in the world. Computer Weekly exposed state monitoring of Parliamentary emails, and reported on activist Lauri Love’s legal battle to be tried in the UK over alleged hacking in the US

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404654/Top-10-state-surveillance-investigatory-powers-and-activism-stories-of-2016


from Tumblr http://zoehamilton671.tumblr.com/post/154801257730
via Zoe Hamilton

Wednesday 21 December 2016

Encryption App ‘Signal’ Fights Censorship With a Clever Workaround

Encryption App ‘Signal’ Fights Censorship With a Clever Workaround
A technique called “domain fronting” makes the app’s encrypted traffic look no different from a Google search. The post Encryption App ‘Signal’ Fights Censorship With a Clever Workaround appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/encryption-app-signal-fights-censorship-clever-workaround/
from Tumblr http://zoehamilton671.tumblr.com/post/154776006955
via Zoe Hamilton

Anonymous’ Barrett Brown Is Free—and Ready to Pick New Fights

Anonymous’ Barrett Brown Is Free—and Ready to Pick New Fights
After four years in prison, Anonymous’ rabblerousing information activist is back with a new plan to restart his radical muckraking. The post Anonymous’ Barrett Brown Is Free—and Ready to Pick New Fights appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/anonymous-barrett-brown-free-ready-pick-new-fights/
from Tumblr http://zoehamilton671.tumblr.com/post/154762218005
via Zoe Hamilton

European court delivers blow to Snoopers’ Charter

Parts of the controversial Investigatory Powers Act relating to the bulk collection of communications data have been ruled unlawful by the European Court of Justice

from ComputerWeekly: IT security http://www.computerweekly.com/news/450409635/European-court-delivers-blow-to-Snoopers-Charter


from Tumblr http://zoehamilton671.tumblr.com/post/154761610210
via Zoe Hamilton

Top 10 IT security stories of 2016

Here are Computer Weekly’s top 10 IT security stories of 2016:

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404341/Top-10-IT-security-stories-of-2016


from Tumblr http://zoehamilton671.tumblr.com/post/154759223085
via Zoe Hamilton

Top 10 CW Middle East stories of 2016

Read the most popular articles about enterprise IT in the Middle East

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403785/Top-10-CW-Middle-East-stories-of-2016


from Tumblr http://zoehamilton671.tumblr.com/post/154759222995
via Zoe Hamilton

Tuesday 20 December 2016

Top 10 CW Nordics stories of 2016

Read the top 10 Nordic enterprise IT stories from Computer Weekly

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403696/Top-10-CW-Nordics-stories-of-2016


from Tumblr http://zoehamilton671.tumblr.com/post/154715716500
via Zoe Hamilton

Top 10 cyber crime stories of 2016

Here are Computer Weekly’s top 10 cyber crime stories of 2016:

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404344/Top-10-cyber-crime-stories-of-2016


from Tumblr http://zoehamilton671.tumblr.com/post/154715716375
via Zoe Hamilton

Monday 19 December 2016

Could blockchain revolutionise the Middle East?

The Middle East could pioneer the use of blockchain, transforming the processes used by organisations in the region

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404690/Could-blockchain-revolutionise-the-Middle-East


from Tumblr http://zoehamilton671.tumblr.com/post/154668164030
via Zoe Hamilton

Friday 16 December 2016

Obama Curbed Chinese Hacking, But Russia Won’t Be So Easy

Obama Curbed Chinese Hacking, But Russia Won’t Be So Easy
The Obama administration’s success story countering China’s hacking offers lessons about how to deter Russia’s attacks—and also how much tougher. The post Obama Curbed Chinese Hacking, But Russia Won’t Be So Easy appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/obama-russia-hacking-sanctions-china/
from Tumblr http://zoehamilton671.tumblr.com/post/154562987640
via Zoe Hamilton

Thursday 15 December 2016

“Secure the News” Grades Media Sites on HTTPS—And Most Fail

“Secure the News” Grades Media Sites on HTTPS—And Most Fail
A new service shows just how secure news sites are. Spoiler: Most of them aren’t. The post “Secure the News” Grades Media Sites on HTTPS—And Most Fail appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/secure-news-grades-media-sites-https-fail/
from Tumblr http://zoehamilton671.tumblr.com/post/154506839600
via Zoe Hamilton

Typo allowed Russian hackers to access US Democratic Party emails

Typographical mistake in an email warning of a phishing attack on the US Democrats led to thousands of private emails being accessed and published by Russian-backed hackers

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404682/Typo-allowed-Russian-hackers-to-access-US-Democratic-Party-emails


from Tumblr http://zoehamilton671.tumblr.com/post/154504378365
via Zoe Hamilton

Yahoo hacked: One billion users affected by August 2013 data breach, company confirms

Yahoo confirms details of a historic data breach, dating back to 2013, affecting one billion users

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404680/Yahoo-hacked-One-billion-users-affected-by-August-2013-data-breach-company-confirms


from Tumblr http://zoehamilton671.tumblr.com/post/154503983315
via Zoe Hamilton

Wednesday 14 December 2016

IT services advisory sector consolidates as ISG acquires Alsbridge

Significant robotic process automation skills included in ISG’s $74m acquisition of Alsbridge

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404611/IT-services-advisory-sector-consolidates-as-ISG-acquires-Alsbridge


from Tumblr http://zoehamilton671.tumblr.com/post/154467378605
via Zoe Hamilton

150 Filmmakers Ask Nikon and Canon to Sell Encrypted Cameras

150 Filmmakers Ask Nikon and Canon to Sell Encrypted Cameras
It’s high time camera companies give photojournalists and filmmakers the same protections built into your iPhone and WhatsApp. The post 150 Filmmakers Ask Nikon and Canon to Sell Encrypted Cameras appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/200-filmmakers-ask-nikon-canon-sell-encrypted-cameras/
from Tumblr http://zoehamilton671.tumblr.com/post/154464529680
via Zoe Hamilton

Swedish trading venue Nasdaq Stockholm fined for cyber security failures

The Swedish financial services regulator FI fines Nasdaq Stockholm and its clearing operation for not managing its security supplier adequately

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404605/Swedish-trading-venue-Nasdaq-Stockholm-fined-for-cyber-security-failures


from Tumblr http://zoehamilton671.tumblr.com/post/154461439195
via Zoe Hamilton

Tuesday 13 December 2016

KFC hacked: Customers urged to reset loyalty scheme passwords

Fast food giant has emailed all 1.2 million members of its loyalty scheme, urging them to change their passwords after its recent data breach

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404526/KFC-hacked-Customers-urged-to-reset-loyalty-scheme-passwords


from Tumblr http://zoehamilton671.tumblr.com/post/154416126270
via Zoe Hamilton

Monday 12 December 2016

Citrix: How the great survivor challenges the tech giants

In spite of Microsoft and VMware encroaching on its core product areas, Citrix is a company which seems to have “staying power”

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404338/Citrix-How-the-great-survivor-challenges-the-tech-giants


from Tumblr http://zoehamilton671.tumblr.com/post/154383979970
via Zoe Hamilton

Trump Ignoring US Intelligence Creates Risks Beyond Russian Hacking

Trump Ignoring US Intelligence Creates Risks Beyond Russian Hacking
Donald Trump’s growing divide with the intelligence communities could have consequences well beyond Russia. The post Trump Ignoring US Intelligence Creates Risks Beyond Russian Hacking appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/trump-cia-national-intelligence-briefings/
from Tumblr http://zoehamilton671.tumblr.com/post/154380810215
via Zoe Hamilton

KPMG cautions CEOs against ignoring GDPR requirements because of Brexit

Professional services giant KPMG says UK businesses cannot afford to ignore incoming European data protection requirements if they want to continue to trade successfully with the continent in future

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404457/KPMG-cautions-CEOs-against-ignoring-GDPR-requirements-over-post-Brexit-data-protection-uncertainty


from Tumblr http://zoehamilton671.tumblr.com/post/154379612605
via Zoe Hamilton

Disaster recovery testing: technology systems to test DR

In this concluding part of a two-part series, Computer Weekly looks at ways of testing disaster recovery plans, with methods including array-based replication and hypervisor-based approaches

from ComputerWeekly: IT security http://www.computerweekly.com/feature/Disaster-recovery-testing-Technology-systems-to-test-DR


from Tumblr http://zoehamilton671.tumblr.com/post/154373795690
via Zoe Hamilton

Friday 9 December 2016

IT Priorities 2017: Buyers look for network privacy, visibility tools

The 2017 Computer Weekly/TechTarget IT Priorities survey shows growing interest in network privacy, security and management, but SDN and NFV are still lagging

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404334/IT-Priorities-2017-Buyers-look-for-network-privacy-visibility-tools


from Tumblr http://zoehamilton671.tumblr.com/post/154249128505
via Zoe Hamilton

Blackberry changes tack to secure enterprise internet of things

After dropping devices to concentrate on mobile device management, Blackberry is poised to take on IoT security under John Chen’s leadership

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404392/Blackberry-changes-tack-to-secure-enterprise-internet-of-things


from Tumblr http://zoehamilton671.tumblr.com/post/154249128625
via Zoe Hamilton

Thursday 8 December 2016

PowerShell security threats greater than ever, researchers warn

Administrators should upgrade to the latest version of Microsoft PowerShell and enable extended logging and monitoring capabilities in the light of a surge in related security threats, warn researchers

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404333/PowerShell-security-threats-greater-than-ever-researchers-warn


from Tumblr http://zoehamilton671.tumblr.com/post/154207947855
via Zoe Hamilton

Security Think Tank: Simplify infosec messages: If not X, then Y and Z

How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Simplify-infosec-messages-If-not-X-then-Y-and-Z


from Tumblr http://zoehamilton671.tumblr.com/post/154207947580
via Zoe Hamilton

More than 2,000 TalkTalk routers hijacked by Mirai botnet variant

Security researchers are urging ISPs to issue emergency patches for Marai botnet infections after 2,374 TalkTalk routers were linked in a regional botnet

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404326/More-than-2000-TalkTalk-routers-hijacked-by-Mirai-botnet-variant


from Tumblr http://zoehamilton671.tumblr.com/post/154202475915
via Zoe Hamilton

Wednesday 7 December 2016

The United Arab Emirates enterprise IT trends for 2017

The UAE is already a leader in areas such as smart city developments, and 2017 looks set to see organisations in the country increase its adoption of other transformational IT

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404250/The-United-Arab-Emirates-enterprise-IT-trends-for-2017


from Tumblr http://zoehamilton671.tumblr.com/post/154189901955
via Zoe Hamilton

The Election Is Over. The Probe Into Russian Hacks Shouldn’t Be

The Election Is Over. The Probe Into Russian Hacks Shouldn’t Be
Two Congressmen are calling for a commission to investigate Russian political hacking. Cybersecurity experts are backing the idea. The post The Election Is Over. The Probe Into Russian Hacks Shouldn’t Be appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/russian-election-hacking-investigation/
from Tumblr http://zoehamilton671.tumblr.com/post/154182125820
via Zoe Hamilton

Few iOS apps in enterprises meet Apple’s new security mandate

Most iOS apps in the enterprise pose potential security risks, according to research by Appthority

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404262/Few-iOS-apps-in-enterprises-meet-Apples-new-security-mandate


from Tumblr http://zoehamilton671.tumblr.com/post/154168657025
via Zoe Hamilton

IT Priorities 2017: What will IT decision-makers be focusing on?

Each year, TechTarget looks at how CIOs and senior IT decision-makers will be investing in IT in the 12 months ahead

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404188/IT-Priorities-2017-What-will-IT-decision-makers-be-focusing-on


from Tumblr http://zoehamilton671.tumblr.com/post/154168656695
via Zoe Hamilton

Security Think Tank: Communication is key to cyber security in digital era

How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Communication-is-key-to-cyber-security-in-digital-era


from Tumblr http://zoehamilton671.tumblr.com/post/154166880645
via Zoe Hamilton

40 firms to trial IBM Watson cognitive computing for cyber security

Forty companies sign up to apply IBM’s Watson cognitive computing systems to cyber security, but threat intelligence experts caution against total reliance on such systems

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404252/40-firms-to-trial-IBM-Watson-cognitive-computing-for-cyber-security


from Tumblr http://zoehamilton671.tumblr.com/post/154166880405
via Zoe Hamilton

Tuesday 6 December 2016

Dailymotion breach prompts calls for password alternatives

The latest breach of millions of user details prompts fresh calls for better security of user data and an alternative to passwords

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404205/Dailymotion-breach-prompts-calls-for-password-alternatives


from Tumblr http://zoehamilton671.tumblr.com/post/154126139230
via Zoe Hamilton

This App Wants to Be Your Encrypted, Self-Destructing Slack

This App Wants to Be Your Encrypted, Self-Destructing Slack
As anxiety grows over leaked, hacked, and subpoenaed conversations, Wickr is expanding its encrypted messaging app into workplace collaboration. The post This App Wants to Be Your Encrypted, Self-Destructing Slack appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/wickr-professional-encrypted-work-chat/
from Tumblr http://zoehamilton671.tumblr.com/post/154125060430
via Zoe Hamilton

Security Think Tank: How to make cyber risk easier for business to understand

How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-How-to-make-cyber-risk-easier-for-business-to-understand


from Tumblr http://zoehamilton671.tumblr.com/post/154116802970
via Zoe Hamilton

UK falls below global cyber security confidence

Global confidence in ability to accurately assess cyber risk has fallen in the past year, but the UK has fallen below the global average

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404174/UK-falls-below-global-cyber-security-confidence


from Tumblr http://zoehamilton671.tumblr.com/post/154116699540
via Zoe Hamilton

Monday 5 December 2016

What happens to data protection when we leave the EU?

The UK was a keen participant in the formulation of new data protection laws for the European Union, but its electorate has since voted to leave the EU. How is that likely to affect data protection in the UK once Brexit is accomplished?

from ComputerWeekly: IT security http://www.computerweekly.com/feature/What-happens-to-data-protection-when-we-leave-the-EU


from Tumblr http://zoehamilton671.tumblr.com/post/154083060840
via Zoe Hamilton

Obama Has a Plan to Fix Cybersecurity, But Its Success Depends on Trump

Obama Has a Plan to Fix Cybersecurity, But Its Success Depends on Trump
Obama’s presidential commission on cybersecurity wants consumer product security ratings and a new generation of government hackers. Will Trump listen? The post Obama Has a Plan to Fix Cybersecurity, But Its Success Depends on Trump appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/obama-cybersecurity-plan/
from Tumblr http://zoehamilton671.tumblr.com/post/154080862905
via Zoe Hamilton

The ICO drafts in expertise of former diplomat

Former British diplomat Rob Luke takes up the role of the ICO’s second deputy commissioner in January 2017

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404130/The-ICO-drafts-in-expertise-of-former-diplomat


from Tumblr http://zoehamilton671.tumblr.com/post/154079368445
via Zoe Hamilton

Europol hosts simulated cyber attack on retail sector

Europol and MasterCard hold a retail cyber attack simulation exercise to raise awareness of the issue and how to respond to attacks, as well as promote information sharing in the sector

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404120/Europol-hosts-simulated-cyber-attack-on-retail-sector


from Tumblr http://zoehamilton671.tumblr.com/post/154079368345
via Zoe Hamilton

Security Think Tank: Cyber risk not just an IT issue

How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Cyber-risk-not-just-an-IT-issue


from Tumblr http://zoehamilton671.tumblr.com/post/154079368200
via Zoe Hamilton

UK and European firms to continue to invest in data protection ahead of GDPR

Data protection is to remain a key focus for IT security investment for European firms in 2017, but the emphasis is on cloud and mobile security as companies move to these technology platforms

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404112/UK-and-European-firms-to-continue-to-invest-in-data-protection-ahead-of-GDPR


from Tumblr http://zoehamilton671.tumblr.com/post/154073605005
via Zoe Hamilton

Top 10 ANZ enterprise IT stories of 2016

Here is a rundown of Computer Weekly’s most popular ANZ enterprise IT articles for 2016

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403537/Top-10-ANZ-enterprise-IT-stories-of-2016


from Tumblr http://zoehamilton671.tumblr.com/post/154071251375
via Zoe Hamilton

Top 10 Asean enterprise IT stories of 2016

The 10 most popular Asean articles of 2016

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403540/Top-10-Asean-enterprise-IT-stories-of-2016


from Tumblr http://zoehamilton671.tumblr.com/post/154071251130
via Zoe Hamilton

Friday 2 December 2016

Security Think Tank: Cyber security must be recognised as a fundamental component of business

How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Cyber-security-must-be-recognised-as-a-fundamental-component-of-business


from Tumblr http://zoehamilton671.tumblr.com/post/153953428260
via Zoe Hamilton

Security veteran urges firms to prioritise spear phishing defence

UK firms should prioritise defence against spear phishing as a key component of cyber attacks, according to security veteran Peter Wood

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404028/Security-veteran-urges-firms-to-prioritise-spear-phishing-defence


from Tumblr http://zoehamilton671.tumblr.com/post/153949717695
via Zoe Hamilton

UK helps dismantle Avalanche global cyber network

The UK’s National Crime Agency has contributed to the takedown of a cloud-based cyber crime network in a collaborative law enforcement operation involving 30 countries

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404018/UK-helps-dismantle-Avalanche-global-cyber-network


from Tumblr http://zoehamilton671.tumblr.com/post/153949717460
via Zoe Hamilton

Academics link payment card vulnerability to Tesco Bank cyber heist

UK academics uncover a vulnerability in online payment systems, which they say could have been used in the Tesco Bank cyber heist

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403998/Academics-link-payment-card-vulnerability-to-Tesco-Bank-cyber-heist


from Tumblr http://zoehamilton671.tumblr.com/post/153944012450
via Zoe Hamilton

Thursday 1 December 2016

Mirai botnet hits Post Office Broadband and Kcom customers

Broadband providers Post Office Broadband and Kcom are among a number of operators to have been hit by a hack targeting Zyxel routing hardware

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403957/Mirai-botnet-hits-Post-Office-Broadband-and-Kcom-customers


from Tumblr http://zoehamilton671.tumblr.com/post/153911407585
via Zoe Hamilton

US and UK government expand surveillance powers

The US has introduced wide new hacking powers for federal agents a day after the UK’s Investigatory Powers Act firmed up bulk surveillance powers for intelligence and polices services

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403905/US-and-UK-government-expand-surveillance-powers


from Tumblr http://zoehamilton671.tumblr.com/post/153907633740
via Zoe Hamilton

Security Think Tank: Cyber security is everyone’s responsibility

How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Cyber-security-is-everyones-responsibility


from Tumblr http://zoehamilton671.tumblr.com/post/153907633650
via Zoe Hamilton

Mozilla and Tor issue patches for Firefox flaw exposing Tor users

Users of Tor anonymous browsing urged to update to the latest versions of relevant software to block an exploit that collects IP and MAC addresses to identify users

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403896/Mozilla-and-Tor-issue-patches-for-Firefox-flaw-exposing-Tor-users


from Tumblr http://zoehamilton671.tumblr.com/post/153902120010
via Zoe Hamilton

Wednesday 30 November 2016

Thousands of National Lottery accounts hacked

National Lottery operator Camelot says the log-in details of thousands of people who do the lottery online have been stolen

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403786/Thousands-of-National-Lottery-accounts-hacked


from Tumblr http://zoehamilton671.tumblr.com/post/153859069505
via Zoe Hamilton

Disaster recovery testing: A vital part of the DR plan

Disaster recovery provision is worthless unless you test out your plans. In this two-part series, Computer Weekly looks at disaster recovery testing in virtualised datacentres

from ComputerWeekly: IT security http://www.computerweekly.com/feature/Disaster-recovery-testing-A-vital-part-of-the-DR-plan


from Tumblr http://zoehamilton671.tumblr.com/post/153859069425
via Zoe Hamilton

Security Think Tank: Managing cyber risk requires genuine understanding

How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Managing-cyber-risk-requires-genuine-understanding


from Tumblr http://zoehamilton671.tumblr.com/post/153856877360
via Zoe Hamilton

Tuesday 29 November 2016

Ross Ulbricht’s Lawyers Point to Another Corrupt Agent in Silk Road Case

Ross Ulbricht’s Lawyers Point to Another Corrupt Agent in Silk Road Case
The defense team demands more information about a mysterious figure known as “alpacino.” The post Ross Ulbricht’s Lawyers Point to Another Corrupt Agent in Silk Road Case appeared first on WIRED.

from WIRED https://www.wired.com/2016/11/ross-ulbrichts-lawyers-point-another-corrupt-agent-silk-road-case/
from Tumblr http://zoehamilton671.tumblr.com/post/153828886265
via Zoe Hamilton

Security Think Tank: Cyber risk – Overlooked? Ignored? Under-appreciated?

How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Cyber-risk-Overlooked-Ignored-Under-appreciated


from Tumblr http://zoehamilton671.tumblr.com/post/153821730695
via Zoe Hamilton

Deutsche Telekom botnet attack underlines infrastructure vulnerabilities

German telco says its broadband outages are linked to a botched attempt to hijack routers, which security experts say further underlines the cyber threat to internet connected infrastructure

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403678/Deutsche-Telekom-botnet-attack-underlines-infrastructure-vulnerabilities


from Tumblr http://zoehamilton671.tumblr.com/post/153821730505
via Zoe Hamilton

Monday 28 November 2016

IBM blamed for Australian census website crash

Computer giant reportedly pays $30m to Australian government as reports are released from two inquiries into DDoS attacks on census website

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403576/IBM-blamed-for-Australian-census-website-crash


from Tumblr http://zoehamilton671.tumblr.com/post/153804454070
via Zoe Hamilton

San Francisco transport system hit by ransomware attack

San Francisco’s transport agency appears to be the latest target of cyber criminals using encryption malware to hold organisations to ransom

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403594/San-Francisco-transport-system-hit-by-ransomware-attack


from Tumblr http://zoehamilton671.tumblr.com/post/153778315125
via Zoe Hamilton

HMRC geared up to block 500 million phishing emails a year

HMRC is first department to implement technology to block phishing emails as part of UK government’s active cyber defence programme and self-testing strategy

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403583/HMRC-blocks-500000-phishing-emails-in-2015


from Tumblr http://zoehamilton671.tumblr.com/post/153778315010
via Zoe Hamilton

Hacker Lexicon: What Is Perfect Forward Secrecy?

Hacker Lexicon: What Is Perfect Forward Secrecy?
If you’d prefer that years worth of your secrets <em>stay</em> secret, this obscure encryption feature matters. The post Hacker Lexicon: What Is Perfect Forward Secrecy? appeared first on WIRED.

from WIRED https://www.wired.com/2016/11/what-is-perfect-forward-secrecy/
from Tumblr http://zoehamilton671.tumblr.com/post/153773188275
via Zoe Hamilton

Petition to force MPs to consider debate on surveillance bill

Open Rights Group has called on parliament to debate the Investigatory Powers Bill and review it in light of pending court actions, after petition against the bill tops 100,000 signatories

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403572/Petition-to-force-Mps-to-consider-debate-on-surveillance-bill


from Tumblr http://zoehamilton671.tumblr.com/post/153772599940
via Zoe Hamilton

Friday 25 November 2016

Is the infomation security supplier market really consolidating?

Mergers and acquisitions continue at pace in the information security market, but these are not necessarily signs of consolidation, writes Martin Kuppinger

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Is-the-infomation-security-supplier-market-really-consolidating


from Tumblr http://zoehamilton671.tumblr.com/post/153645613655
via Zoe Hamilton

One in four Wi-Fi hotspots vulnerable to attack, study finds

At least one in four Wi-Fi hotspots are open to attack, a study by Kaspersky Lab reveals

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403539/One-in-four-Wi-Fi-hotspots-vulnerable-to-attack-study-finds


from Tumblr http://zoehamilton671.tumblr.com/post/153645613410
via Zoe Hamilton

US Navy breach highlights third-party cyber risk

The personal details of more than 130,000 current and former US Navy personnel have been exposed in a breach linked to the compromise of third-party supplier’s laptop

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403530/US-Navy-breach-highlights-third-party-cyber-risk


from Tumblr http://zoehamilton671.tumblr.com/post/153639740170
via Zoe Hamilton

UK firms neglecting cyber security, say 74% of IT managers

Most UK firms lack the time and resources to ensure adequate cyber security and data protection, according to a survey of IT managers

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403521/UK-firms-neglecting-cyber-security-say-74-of-IT-managers


from Tumblr http://zoehamilton671.tumblr.com/post/153639500220
via Zoe Hamilton

Thursday 24 November 2016

Customer data integration a market opportunity, says CXP Group consultant

Technology and service providers should focus on customer data integration to help businesses improve customer satisfaction, says CXP Group consultant Nicole Dufft

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403505/Customer-data-integration-a-market-opportunity-says-CXP-Group-consultant


from Tumblr http://zoehamilton671.tumblr.com/post/153607813610
via Zoe Hamilton

Gigya is consumer identify leader, finds KuppingerCole

Gigya, Ping Identity, Salesforce, ForgeRock are the current leaders in the consumer identity and access management market, according to a report by KuppingerCole

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403494/Gigya-is-consumer-identify-leader-finds-KuppingerCole


from Tumblr http://zoehamilton671.tumblr.com/post/153603599095
via Zoe Hamilton

Bletchley Park to teach teenagers to become cyber experts

A cyber security college is to be set up at Bletchley Park, home to the men and women who decoded German cyphers during the Second World War

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403493/Bletchley-Park-to-teach-teenagers-to-become-cyber-experts


from Tumblr http://zoehamilton671.tumblr.com/post/153603598995
via Zoe Hamilton

A single, integrated consumer ID system is best, says Martin Kuppinger

A bi-modal, integrated IAM system will help avoid the pitfalls associated with other approaches to consumer identity, according to Martin Kuppinger

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403480/A-single-integrated-consumer-ID-system-is-best-says-Martin-Kuppinger


from Tumblr http://zoehamilton671.tumblr.com/post/153598213150
via Zoe Hamilton

Wednesday 23 November 2016

Hacked or Not, Audit This Election (And All Future Ones)

Hacked or Not, Audit This Election (And All Future Ones)
“Brush your teeth, eat your spinach, audit your elections.” The post Hacked or Not, Audit This Election (And All Future Ones) appeared first on WIRED.

from WIRED https://www.wired.com/2016/11/hacked-not-audit-election-rest/
from Tumblr http://zoehamilton671.tumblr.com/post/153571526675
via Zoe Hamilton

High-assurance identity top priority for government and finance

The UK government and financial sector is working together to meet the need for high-assurance identity globally

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403412/High-assurance-identity-top-priority-for-government-and-finance


from Tumblr http://zoehamilton671.tumblr.com/post/153555796705
via Zoe Hamilton

Customer identity evolves over time, says Gigya

Customer identity evolves through a series of interactions to enable richer data for improved marketing and customer experiences, says Gigya co-founder Rooly Eliezerov

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403413/Customer-identity-evolves-over-time-says-Gigya


from Tumblr http://zoehamilton671.tumblr.com/post/153555796650
via Zoe Hamilton

Tuesday 22 November 2016

Alibaba brings public cloud to the Middle East

Alibaba has opened a datacentre in Dubai to attract businesses in the Middle East to its public cloud services

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403353/Alibaba-brings-public-cloud-to-the-Middle-East


from Tumblr http://zoehamilton671.tumblr.com/post/153519180445
via Zoe Hamilton

Consumer identity key to digital transformation

Customer identity and access management has benefits for consumers and service providers alike, but is key to digital transformation, says KuppingerCole

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403350/Consumer-identity-key-to-digital-transformation


from Tumblr http://zoehamilton671.tumblr.com/post/153519180315
via Zoe Hamilton

Alleged hacker Lauri Love’s ‘life will be destroyed’ under Trump regime

Supporters fear for activist Lauri Love if his extradition to face hacking charges to the US goes ahead

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403348/Alleged-hacker-Lauri-Loves-life-will-be-destroyed-under-Trump-regime


from Tumblr http://zoehamilton671.tumblr.com/post/153519180160
via Zoe Hamilton

Great. Now Even Your Headphones Can Spy on You

Great. Now Even Your Headphones Can Spy on You
Israeli researchers show that even if you’re paranoid enough to remove your computer’s microphone, malware can convert your headphones into spy bugs. The post Great. Now Even Your Headphones Can Spy on You appeared first on WIRED.

from WIRED https://www.wired.com/2016/11/great-now-even-headphones-can-spy/
from Tumblr http://zoehamilton671.tumblr.com/post/153514080160
via Zoe Hamilton

Monday 21 November 2016

Fight against Investigatory Powers Bill may not be over

Labour’s shadow home secretary Diane Abbott says that wider society must now debate the controversial Investigatory Powers Bill, despite Parliamentary approval

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Fight-against-Investigatory-Powers-Bill-may-not-be-over


from Tumblr http://zoehamilton671.tumblr.com/post/153476336100
via Zoe Hamilton

Friday 18 November 2016

Jeff Sessions’ Nomination as Attorney General Alarms Civil Libertarians

Jeff Sessions’ Nomination as Attorney General Alarms Civil Libertarians
Donald Trump has nominated Senator Jeff Sessions to be attorney general. Civil liberties groups say that’s a likely catastrophe for privacy and immigration. The post Jeff Sessions’ Nomination as Attorney General Alarms Civil Libertarians appeared first on WIRED.

from WIRED https://www.wired.com/2016/11/jeff-sessions-nomination-attorney-general-alarms-civil-libertarians/
from Tumblr http://zoehamilton671.tumblr.com/post/153363197165
via Zoe Hamilton

Three breach highlights several security issues, says (ISC)2

Customer data breaches continue to demonstrate that companies are still not treating cyber risk like every other business risk, says Adrian Davis of (ISC)2

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403187/Three-breach-highlights-several-security-issues-says-ISC2


from Tumblr http://zoehamilton671.tumblr.com/post/153349435215
via Zoe Hamilton

European security industry has failed users, says expert

Cryptology expert Bart Preneel says the European security industry must commit to secure communication for the masses and open source is the key to secure infrastructure

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403176/European-security-industry-has-failed-users-says-expert


from Tumblr http://zoehamilton671.tumblr.com/post/153345820930
via Zoe Hamilton

Hackers arrested in Three mobile upgrade scam

Three men arrested in connection with mobile handset upgrade fraud enabled by unauthorised access to customer data

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403170/Hackers-arrested-in-Three-mobile-upgrade-scam


from Tumblr http://zoehamilton671.tumblr.com/post/153339994450
via Zoe Hamilton

Thursday 17 November 2016

One million cyber attacks on UK retailers forecast for Christmas

Cyber attacks on internet shopping are expected to increase in the run up to Christmas, with a million attacks targeted at UK retailers alone

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403101/One-million-cyber-attacks-on-UK-retailers-forecast-for-Christmas


from Tumblr http://zoehamilton671.tumblr.com/post/153303990390
via Zoe Hamilton

Investigatory Powers Bill looks set to become law

Rights groups have vowed to continue to oppose the controversial Investigatory Powers Bill, which is now just two steps away from becoming law

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403089/Investigatory-Powers-Bill-looks-set-to-become-law


from Tumblr http://zoehamilton671.tumblr.com/post/153298785020
via Zoe Hamilton

Security Think Tank: Cyber insurance may not provide cover where it is most needed

What should organisations consider if they are to prepare for cyber insurance?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Cyber-insurance-may-not-provide-cover-where-it-is-most-needed


from Tumblr http://zoehamilton671.tumblr.com/post/153298784930
via Zoe Hamilton

Wednesday 16 November 2016

Digital transformation not a finite process, says Martin Kuppinger

Security, privacy and identity are key to digital transformation, which is an evolutionary process, according to Martin Kuppinger

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403020/Digital-transformation-not-a-finite-process-says-Martin-Kuppinger


from Tumblr http://zoehamilton671.tumblr.com/post/153265303815
via Zoe Hamilton

Business needs AI defence against AI attacks, says Darktrace

Cyber attackers are turning to machine learning to create smarter attacks and defenders will require similar technology to detect them, warns Darktrace

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403013/Business-needs-AI-defence-against-AI-attacks-says-Darktrace


from Tumblr http://zoehamilton671.tumblr.com/post/153261167915
via Zoe Hamilton

Wickedly Clever USB Stick Installs a Backdoor on Locked PCs

Wickedly Clever USB Stick Installs a Backdoor on Locked PCs
The proof-of-concept tool PoisonTap uses a series of subtle design flaws to steal a victim’s cookies and even hack their router or intranet. The post Wickedly Clever USB Stick Installs a Backdoor on Locked PCs appeared first on WIRED.

from WIRED https://www.wired.com/2016/11/wickedly-clever-usb-stick-installs-backdoor-locked-pcs/
from Tumblr http://zoehamilton671.tumblr.com/post/153257291240
via Zoe Hamilton

Security Think Tank: Ensure cyber insurance is right and helps reduce risk

What should organisations consider if they are to prepare for cyber insurance?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Ensure-cyber-insurance-is-right-and-helps-reduce-risk


from Tumblr http://zoehamilton671.tumblr.com/post/153255878715
via Zoe Hamilton

Adobe uses shared responsibility to meet security challenges

Adobe discovers ways of addressing security challenges of scalability, diverse technology stacks and business criticality

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403002/Adobe-uses-shared-responsibility-to-meet-security-challenges


from Tumblr http://zoehamilton671.tumblr.com/post/153255878550
via Zoe Hamilton

Tuesday 15 November 2016

Identity for online gambling industry a potential market opportunity

Identity for online gambling presents a potential market opportunity, because no suppliers are meeting the industry’s consumer identify requirements

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402936/Identity-for-online-gambling-industry-a-potential-market-opportunity


from Tumblr http://zoehamilton671.tumblr.com/post/153221444505
via Zoe Hamilton

Online identity needs to be fixed, says Microsoft’s Kim Cameron

Software giant’s identity architect calls on enterprises to professionalise the way they relate to customers to help replace online identity infrastructure that is not fit for purpose

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402942/Online-identity-needs-to-be-fixed-says-Microsofts-Kim-Cameron


from Tumblr http://zoehamilton671.tumblr.com/post/153217844700
via Zoe Hamilton

TalkTalk bouncing back a year on from cyber attack, says CEO

A year after a major data security breach laid waste to its reputation, TalkTalk boss Dido Harding says things are turning around

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402930/TalkTalk-bouncing-back-a-year-on-from-cyber-attack-says-CEO


from Tumblr http://zoehamilton671.tumblr.com/post/153217844550
via Zoe Hamilton

Monday 14 November 2016

Hack Brief: 412M Accounts Breached on FriendFinder Sex Sites

Hack Brief: 412M Accounts Breached on FriendFinder Sex Sites
The breach is nearly 13 times the size of last year’s hack of sex site Ashley Madison. The post Hack Brief: 412M Accounts Breached on FriendFinder Sex Sites appeared first on WIRED.

from WIRED https://www.wired.com/2016/11/hack-brief-412m-accounts-breached-friendfinder-sex-sites/
from Tumblr http://zoehamilton671.tumblr.com/post/153180315440
via Zoe Hamilton

The internet of things data explosion and storage and compliance

Vigitrust’s Mathieu Gorge reports from Web Summit 2016 on the explosion of data that comes with the internet of things and its implications for data storage and compliance

from ComputerWeekly: IT security http://www.computerweekly.com/podcast/The-internet-of-things-data-explosion-and-storage-and-compliance


from Tumblr http://zoehamilton671.tumblr.com/post/153174418840
via Zoe Hamilton

CIO interview: Marc Touitou, the World Health Organisation

Ebola was a wake-up call. Marc Touitou joined the World Health Organisation as the outbreak started and set about being a catalyst for change

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402779/CIO-interview-Marc-Touitou-the-World-Health-Organisation


from Tumblr http://zoehamilton671.tumblr.com/post/153174418680
via Zoe Hamilton

Security Think Tank: Lower insurance premiums through security certification

What should organisations consider if they are to prepare for cyber insurance?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Lower-insurance-premiums-through-security-certification


from Tumblr http://zoehamilton671.tumblr.com/post/153168930375
via Zoe Hamilton

412 million user accounts exposed in FriendFinder Networks hack

Another huge data breach has exposed poor security of user details and continued poor user password practices

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402859/412-million-user-accounts-exposed-in-FriendFinder-Networks-hack


from Tumblr http://zoehamilton671.tumblr.com/post/153168930250
via Zoe Hamilton

Saturday 12 November 2016

Security News This Week: What Trump’s Win Means for Cybersecurity

Security News This Week: What Trump’s Win Means for Cybersecurity
Each weekend we round up the security news that we didn’t break or cover in depth. This week, that news—like most all news—is about President-Elect Trump. The post Security News This Week: What Trump’s Win Means for Cybersecurity appeared first on WIRED.

from WIRED https://www.wired.com/2016/11/security-news-week-trumps-win-means-cybersecurity/
from Tumblr http://zoehamilton671.tumblr.com/post/153080504970
via Zoe Hamilton

Friday 11 November 2016

Security Think Tank: Six key factors in cyber insurance

What should organisations consider if they are to prepare for cyber insurance?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Six-key-factors-in-cyber-insurance


from Tumblr http://zoehamilton671.tumblr.com/post/153044707785
via Zoe Hamilton

National Cyber Security Centre to trial cyber defence initiatives on government

NCSC technical director Ian Levy details some of the initiatives being pursued as part of its Active Cyber Defence Programme

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402794/National-Cyber-Security-Centre-to-trial-cyber-defence-initiatives-on-government


from Tumblr http://zoehamilton671.tumblr.com/post/153044707645
via Zoe Hamilton

GDS aiming for 25 million users of Gov.uk Verify by 2020

Early draft of new GDS strategy reveals an ambitious target for its identity assurance service

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402789/GDS-aiming-for-25-million-users-of-Govuk-Verify-by-2020


from Tumblr http://zoehamilton671.tumblr.com/post/153044707515
via Zoe Hamilton

Russian banks hit by IoT-enabled DDoS attacks

DDoS attacks on Russian banks have been linked to IoT botnets, further confirming this worrying trend and highlighting the need for IoT suppliers to improve security capabilties

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402778/Russian-banks-hit-by-IoT-enabled-DDoS-attacks


from Tumblr http://zoehamilton671.tumblr.com/post/153040293705
via Zoe Hamilton

24 cyber criminals arrested in Europol operation

Romanian police arrest 24 members of a card skimming and cloning operation and identify 47 other suspects

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402767/24-cyber-criminals-arrested-in-Europol-operation


from Tumblr http://zoehamilton671.tumblr.com/post/153034676675
via Zoe Hamilton

Thursday 10 November 2016

GDPR will require 75,000 DPOs worldwide, study shows

The General Data Protection Regulation is likely to help boost the data protection profession, with 75,000 data protection officers needed worldwide for organisations to comply with new EU rules

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402719/GDPR-will-require-75000-DPOs-worldwide-study-shows


from Tumblr http://zoehamilton671.tumblr.com/post/153015294610
via Zoe Hamilton

Security Think Tank: Understand data assets and risks for insurance success

What should organisations consider if they are to prepare for cyber insurance?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Understand-data-assets-and-risks-for-insurance-success


from Tumblr http://zoehamilton671.tumblr.com/post/152997903760
via Zoe Hamilton

Yahoo admits data breach may affect Verizon acquisition

In its latest SEC filing, Yahoo admits some people knew of the 2014 breach shortly after, that the true cost of the breach is still unknown, and that the breach could affect its deal with Verizon

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402692/Yahoo-admits-data-breach-may-affect-Verizon-acquisition


from Tumblr http://zoehamilton671.tumblr.com/post/152997903635
via Zoe Hamilton

Government must tread carefully on AI ethics

Science advisor Mark Walport voices concerns around transparency, accountability and personal security with regard to the use of artificial intelligence by the government

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402688/Government-must-tread-carefully-on-AI-ethics


from Tumblr http://zoehamilton671.tumblr.com/post/152997903425
via Zoe Hamilton

Wednesday 9 November 2016

Trump’s Win Signals Open Season for Russia’s Political Hackers

Trump’s Win Signals Open Season for Russia’s Political Hackers
After their success in the US election, the Kremlin’s hackers are setting their sights on other political processes around the world. The post Trump’s Win Signals Open Season for Russia’s Political Hackers appeared first on WIRED.

from WIRED https://www.wired.com/2016/11/trumps-win-signals-open-season-russias-political-hackers/
from Tumblr http://zoehamilton671.tumblr.com/post/152967060030
via Zoe Hamilton

HP sponsors cyber security research chair at Birmingham University

Five-year research collaboration agreement will support government efforts to address cyber security challenges

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402638/HP-sponsors-cyber-security-research-chair-at-Birmingham-University


from Tumblr http://zoehamilton671.tumblr.com/post/152956682250
via Zoe Hamilton

Security Think Tank: Cyber insurance – factor in all costs and obligations

What should organisations consider if they are to prepare for cyber insurance?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Cyber-insurance-factor-in-all-costs-and-obligations


from Tumblr http://zoehamilton671.tumblr.com/post/152952665330
via Zoe Hamilton

Aller Group deploys Dropbox for Business in European AWS cloud

The end of Safe Harbour left many European businesses exposed in terms of data privacy, but Dropbox now has a German datacentre hosted on Amazon Web Services

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402606/Aller-Group-deploys-Dropbox-for-Business-in-European-AWS-cloud


from Tumblr http://zoehamilton671.tumblr.com/post/152952664870
via Zoe Hamilton

Financial Conduct Authority concerned about cyber security of banks

The FCA expresses concern about the cyber security of banks after 9,000 Tesco Bank customers lost £2.5m in fraudulent transactions

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402600/Financial-Conduct-Authority-concerned-about-cyber-security-of-banks


from Tumblr http://zoehamilton671.tumblr.com/post/152944931095
via Zoe Hamilton

Tuesday 8 November 2016

Hackers Target Pro-Clinton Phone Banks—But Hit Trump’s Too

Hackers Target Pro-Clinton Phone Banks—But Hit Trump’s Too
4chan’s trolls appear to have hit a key company for get-out-the-vote phone banks—one used by both sides of the political aisle. The post Hackers Target Pro-Clinton Phone Banks—But Hit Trump’s Too appeared first on WIRED.

from WIRED https://www.wired.com/2016/11/hackers-target-pro-clinton-phone-banks-hit-trumps/
from Tumblr http://zoehamilton671.tumblr.com/post/152910896415
via Zoe Hamilton

Human-machine teaming key to cyber defence, says Intel Security

Intel Security is working with a select group of customers on developing systems to enable human-machine teaming to get the best of both worlds in applying cyber threat intelligence

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402539/Human-machine-teaming-key-to-cyber-defence-says-Intel-Security


from Tumblr http://zoehamilton671.tumblr.com/post/152905207615
via Zoe Hamilton

AWS shares datacentre security secrets to inspire more enterprise cloud adoption

CISO says there is no need to sacrifice security to pursue innovation in the cloud, as he reveals how the cloud giant safeguards customer information in its datacentres

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402535/AWS-shares-datacentre-security-secrets-to-inspire-more-enterprise-cloud-adoption


from Tumblr http://zoehamilton671.tumblr.com/post/152904489205
via Zoe Hamilton

European agencies seek to bolster co-operation on cyber crime

Fifth annual joint workshop seeks to foster better co-operation between national cyber incident response teams and law enforcement agencies to establish a network to discuss topics of mutual interest

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402529/European-agencies-seek-to-bolster-co-operation-on-cyber-crime


from Tumblr http://zoehamilton671.tumblr.com/post/152901496200
via Zoe Hamilton

Security Think Tank: Cyber insurance a great complement to good security practice

What should organisations consider if they are to prepare for cyber insurance?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Cyber-insurance-a-great-complement-to-good-security-practice


from Tumblr http://zoehamilton671.tumblr.com/post/152901495960
via Zoe Hamilton

Tesco Bank theft shows need to take cyber security more seriously

Tesco Bank compromise should act as a wake up call to UK businesses to take cyber security more seriously, says security industry commentators

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402510/Tesco-Bank-theft-shows-need-to-take-cyber-security-more-seriously


from Tumblr http://zoehamilton671.tumblr.com/post/152894931835
via Zoe Hamilton

Monday 7 November 2016

Security Think Tank: Back up risk assessment with broker advice on cyber insurance

What should organisations consider if they are to prepare for cyber insurance?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Back-up-risk-assessment-with-broker-advice-on-cyber-insurance


from Tumblr http://zoehamilton671.tumblr.com/post/152852714710
via Zoe Hamilton

Tesco Bank halts online banking after weekend hacker fraud

Tesco Bank halts online banking after thousands of current account customers were hit by fraudulent transactions by hackers at the weekend

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402439/Tesco-Bank-halts-online-banking-after-weekend-hacker-fraud


from Tumblr http://zoehamilton671.tumblr.com/post/152852438165
via Zoe Hamilton

Friday 4 November 2016

New cyber security strategy changes relationship between government and IT suppliers

The government has introduced stringent new responsibilities on IT suppliers in its latest cyber security strategy

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/New-cyber-security-strategy-changes-relationship-between-government-and-IT-suppliers


from Tumblr http://zoehamilton671.tumblr.com/post/152733206030
via Zoe Hamilton

Failure to prepare for cyber attack could be catastrophic, warns Ted Koppel

Veteran investigative reporter Ted Koppel says a cyber attack on the US power grid is likely, but preparations for such an event are not up to scratch

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402362/Failure-to-prepare-for-cyber-attack-could-be-catastrophic-warns-Ted-Koppel


from Tumblr http://zoehamilton671.tumblr.com/post/152723516225
via Zoe Hamilton

IoT security window closing

The window of opportunity for addressing security risks in internet of things devices is closing rapidly, according to Intel’s IoT security manager

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402361/IoT-security-window-closing


from Tumblr http://zoehamilton671.tumblr.com/post/152723516110
via Zoe Hamilton

Thursday 3 November 2016

Google’s Chrome Hackers Are About to Upend Your Idea of Web Security

Google’s Chrome Hackers Are About to Upend Your Idea of Web Security
Parisa Tabriz and her team of security engineers are using the world’s most popular browser to drag the web towards encryption. The post Google’s Chrome Hackers Are About to Upend Your Idea of Web Security appeared first on WIRED.

from WIRED https://www.wired.com/2016/11/googles-chrome-hackers-flip-webs-security-model/
from Tumblr http://zoehamilton671.tumblr.com/post/152709279700
via Zoe Hamilton

Check Point, Huawei join Intel Security Innovation Alliance

Intel Security Innovation Alliance continues to grow as security firm opens up McAfee data exchange layer

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402310/Check-Point-Huawei-join-Intel-Security-Innovation-Alliance


from Tumblr http://zoehamilton671.tumblr.com/post/152691051895
via Zoe Hamilton

Intel Security to become McAfee in April 2017

Intel Security has detailed a wave of product innovations at Focus 2016, but promises more to come when it is spun out as an independent company under the McAfee banner

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402263/Intel-Security-to-become-McAfee-in-April-2017


from Tumblr http://zoehamilton671.tumblr.com/post/152688278220
via Zoe Hamilton

Cyber security image putting women and girls off, says panel

There is still a lot of work to be done to change the perception of cyber security and corporate culture to attract more women to the profession, according to a panel of security professionals

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402264/Cyber-security-image-putting-women-and-girls-off-says-panel


from Tumblr http://zoehamilton671.tumblr.com/post/152682283990
via Zoe Hamilton

Wednesday 2 November 2016

This Evil Office Printer Hijacks Your Cellphone Connection

This Evil Office Printer Hijacks Your Cellphone Connection
The hacker-artistic creation is meant to illustrate the privacy flaws of the cellular signals we all depend on. The post This Evil Office Printer Hijacks Your Cellphone Connection appeared first on WIRED.

from WIRED https://www.wired.com/2016/11/evil-office-printer-hijacks-cellphone-connection/
from Tumblr http://zoehamilton671.tumblr.com/post/152659567745
via Zoe Hamilton

Pure-play cyber security has real value, says incoming McAfee head

Intel Security has outlined its strategy to protect the new digital economy as it gears up for innovation as a new independent pure-play security firm under the McAfee banner

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402196/Pure-play-cyber-security-has-real-value-says-incoming-McAfee-head


from Tumblr http://zoehamilton671.tumblr.com/post/152648600865
via Zoe Hamilton

Intel Security shifts channel strategy

Intel Security adjusts its channel strategy in response to a market shift towards services-based security

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402166/Intel-Security-shifts-channel-strategy


from Tumblr http://zoehamilton671.tumblr.com/post/152638342725
via Zoe Hamilton

Tuesday 1 November 2016

Philip Hammond goes on the attack to target cyber threat to UK economy

Speaking at the Microsoft Future Decoded event in London, the Chancellor revealed how Britain would take an offensive stance to protect infrastructure

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402111/Philip-Hammond-goes-on-the-attack-to-target-cyber-threat-to-UK-economy


from Tumblr http://zoehamilton671.tumblr.com/post/152603914620
via Zoe Hamilton

Path to telco revenues lies through improved user trust, says KPMG

Report suggests that half of UK adults would switch telecoms and broadband provider in the event of a security breach, and identifies revenue opportunities in building trust among consumers

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402100/Path-to-telco-revenues-lies-through-improved-user-trust-says-KPMG


from Tumblr http://zoehamilton671.tumblr.com/post/152599516005
via Zoe Hamilton

UK government re-announces £1.9bn cyber security spend

Five-year spending increase - announced by Chancellor Philip Hammond 12 months after George Osborne did so - will support new UK cyber security strategy

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402098/UK-government-re-announces-19bn-cyber-security-spend


from Tumblr http://zoehamilton671.tumblr.com/post/152599515760
via Zoe Hamilton

Monday 31 October 2016

It’s Finally Legally To Hack Your Own Devices (Even Your Car)

It’s Finally Legally To Hack Your Own Devices (Even Your Car)
An exemption in a decade-old anti-hacking statute has finally kicked in, and could unleash a new bounty of security research. The post It’s Finally Legally To Hack Your Own Devices (Even Your Car) appeared first on WIRED.

from WIRED https://www.wired.com/2016/10/hacking-car-pacemaker-toaster-just-became-legal/
from Tumblr http://zoehamilton671.tumblr.com/post/152580858060
via Zoe Hamilton

ICO prepares for post-Brexit GDPR

The Information Commissioner’s Office is to publish a revised timeline for the UK implementing the EU’s General Data Protection Regulation after Brexit

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402036/ICO-prepares-for-post-Brexit-GDPR


from Tumblr http://zoehamilton671.tumblr.com/post/152561209200
via Zoe Hamilton

How software-defined networking can secure critical systems

SDN promises to bring the efficiency gains achieved in server virtualisation to networking, while also boosting security

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402016/How-software-defined-networking-can-secure-critical-systems


from Tumblr http://zoehamilton671.tumblr.com/post/152559668920
via Zoe Hamilton

Self-sovereign identity on the block – ideal or no deal?

There’s a rumour out there in the IT and business world that blockchains could be the magic elixir when it comes to users’ full control and power over their own digital identities. But is that really so?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Self-sovereign-identity-on-the-block-ideal-or-no-deal


from Tumblr http://zoehamilton671.tumblr.com/post/152552958615
via Zoe Hamilton

The cyber threats lurking within every company

Insider threats have been around for a long time, but it is only recently that people have begun to acknowledge the true danger they pose

from ComputerWeekly: IT security http://www.computerweekly.com/feature/The-cyber-threats-lurking-within-every-company


from Tumblr http://zoehamilton671.tumblr.com/post/152552958345
via Zoe Hamilton

Friday 28 October 2016

United Utilities protects field engineering deployment with AirWatch

United Utilities deploys mobile device management software AirWatch to secure Samsung devices running a SAP workforce management app

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401925/United-Utilities-protects-field-engineering-deployment-with-AirWatch


from Tumblr http://zoehamilton671.tumblr.com/post/152426199230
via Zoe Hamilton

Red Cross data breach shows security is still not a priority

The Australian Red Cross Blood Service has responded quickly to a breach of 550,000 donor details, but security commentators say the incident shows security is still not a priority for many organisations

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401910/Red-Cross-data-breach-shows-security-is-still-not-a-priority


from Tumblr http://zoehamilton671.tumblr.com/post/152426199010
via Zoe Hamilton

Apple iCloud and Gmail hacker gets 18 months in jail

A US man is given a sentence of 18 months in jail for hacking into celebrity iCloud and Gmail accounts after investigators failed to find a link with the leak of celebrity nude photos online in 2014

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401905/Apple-iCloud-and-Gmail-hacker-gets-18-months-in-jail


from Tumblr http://zoehamilton671.tumblr.com/post/152426198795
via Zoe Hamilton

Thursday 27 October 2016

Dyn reveals details of complex and sophisticated IoT botnet attack

DNS services provider Dyn, which was the victim of a large-scale DDoS attack perpetrated by an IoT botnet earlier in October, discusses details of its experience

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401857/Dyn-reveals-details-of-complex-and-sophisticated-IoT-botnet-attack


from Tumblr http://zoehamilton671.tumblr.com/post/152382997790
via Zoe Hamilton

Information security set for steep trajectory, says (ISC)2

By helping to create a thriving, diverse and open information security community, (ISC)2 hopes to ensure a steep rise for the profession

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401850/Information-security-set-for-steep-trajectory-says-ISC2


from Tumblr http://zoehamilton671.tumblr.com/post/152382997660
via Zoe Hamilton

Schneider Electric praised for positive response to ICS security flaw

Schneider Electric has patched a security flaw that highlights the vulnerability of industrial control systems to cyber attack

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401831/Schneider-Electric-praised-for-positive-response-to-ICS-security-flaw


from Tumblr http://zoehamilton671.tumblr.com/post/152382997465
via Zoe Hamilton

Wednesday 26 October 2016

US Treasury tells banks to provide more cyber attack information

The US government is calling on financial institutions to share more cyber attack information as concerns grow about the sector’s vulnerability

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401745/US-Treasury-tells-banks-to-provide-more-cyber-attack-information


from Tumblr http://zoehamilton671.tumblr.com/post/152338653235
via Zoe Hamilton

SAP steps up data privacy in Europe

SAP guarantees technicians outside of Europe will not be able to access companies’ sensitive personnel and other records

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401728/SAP-steps-up-data-privacy-in-Europe


from Tumblr http://zoehamilton671.tumblr.com/post/152330235800
via Zoe Hamilton

Tuesday 25 October 2016

Malaysian insurer partners IT supplier to tailor cyber security policies

Partnership is in response to requests from AIG customers for a more comprehensive risk management approach to cyber insurance

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401655/Malaysian-insurer-partners-IT-supplier-to-tailor-cyber-security-policies


from Tumblr http://zoehamilton671.tumblr.com/post/152317197440
via Zoe Hamilton

DevOps largely failing to improve security, study shows

Despite the promise of improved application security, DevOps is failing to deliver due to some key barriers, an HPE study shows

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401645/DevOps-largely-failing-to-improve-security-study-shows


from Tumblr http://zoehamilton671.tumblr.com/post/152295762855
via Zoe Hamilton

Monday 24 October 2016

Dyn DDoS attack highlights vulnerability of global internet infrastructure

Last week’s DDoS attack on DNS firm Dyn has highlighted both the vulnerability of the world’s internet infrastructure, and the dangers of leaving internet of things devices unsecured

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401576/Dyn-DDoS-attack-highlights-vulnerability-of-global-internet-infrastructure


from Tumblr http://zoehamilton671.tumblr.com/post/152251447495
via Zoe Hamilton

In the digital era, customer identity is key

Identity is vital for presenting a consistent customer relationship across digital channels, but not everyone in all organisations understands this shift, according to identity veteran Ian Glazer

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401590/In-the-digital-era-customer-identity-is-key


from Tumblr http://zoehamilton671.tumblr.com/post/152251447150
via Zoe Hamilton

More than 100 MPs ask Obama to halt extradition bid against Lauri Love

UK MPs across all parties call for US President to save activist from extradition to the US on hacking charges on humanitarian grounds

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401567/More-than-100-MPs-ask-Obama-to-halt-extradition-bid-against-Lauri-Love


from Tumblr http://zoehamilton671.tumblr.com/post/152244092130
via Zoe Hamilton

UK National Cyber Security Centre a positive development, says CNI expert

There needs to be greater understanding of cyber threats facing business, and the UK’s new National Cyber Security Centre is a step in the right direction, says CNI expert Barrie Millett

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401575/UK-National-Cyber-Security-Centre-a-positive-development-says-CNI-expert


from Tumblr http://zoehamilton671.tumblr.com/post/152244092055
via Zoe Hamilton

Over 100 MPs sign letter to Obama asking him to drop extradition against alleged hacker Lauri Love

MPs across all parties call for President Barack Obama to save activist Lauri Love from extradition to the US on hacking charges on humanitarian grounds.

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401567/Over-100-MPs-sign-letter-to-Obama-asking-him-to-drop-extradition-against-alleged-hacker-Lauri-Love


from Tumblr http://zoehamilton671.tumblr.com/post/152243977685
via Zoe Hamilton

Friday 21 October 2016

No endgame for cyber security, says Mikko Hypponen

Two of the most valuable lessons in cyber security are to know your enemy and not to rely on users to be secure, according to industry veteran Mikko Hypponen

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401510/No-endgame-for-cyber-security-says-Mikko-Hypponen


from Tumblr http://zoehamilton671.tumblr.com/post/152119912095
via Zoe Hamilton

Major DDoS attack on Dyn causes internet disruption

DNS provider Dyn experiences a large DDoS attack, causing disruption to online services

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401515/Major-DDoS-attack-on-Dyn-causes-internet-disruption


from Tumblr http://zoehamilton671.tumblr.com/post/152115775785
via Zoe Hamilton

Many firms failing on crucial customer experience in digital era

Only through collaboration between all customer-facing parts of a business can it deliver the customer experience that is crucial to survival in the digital era, according to CXP Group consultant Nicole Dufft

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401502/Many-firms-failing-on-crucial-customer-experience-in-digital-era


from Tumblr http://zoehamilton671.tumblr.com/post/152115773315
via Zoe Hamilton

Anonymous’ Most Notorious Hacker Is Back, and He’s Gone Legit

Anonymous’ Most Notorious Hacker Is Back, and He’s Gone Legit
Hector “Sabu” Monsegur has returned to the hacking scene—this time on the right side of the law. The post Anonymous’ Most Notorious Hacker Is Back, and He’s Gone Legit appeared first on WIRED.

from WIRED https://www.wired.com/2016/10/anonymous-notorious-hacker-back-hes-gone-legit/
from Tumblr http://zoehamilton671.tumblr.com/post/152110586900
via Zoe Hamilton