Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2016-12-02 07:00:36 |
UK helps dismantle Avalanche global cyber network (lien direct) |
The UK's National Crime Agency has contributed to the takedown of a cloud-based cyber crime network in a collaborative law enforcement operation involving 30 countries |
|
|
|
|
2016-12-02 05:45:45 |
Academics link payment card vulnerability to Tesco Bank cyber heist (lien direct) |
UK academics uncover a vulnerability in online payment systems, which they say could have been used in the Tesco Bank cyber heist |
|
|
|
|
2016-12-01 11:52:17 |
Mirai botnet hits Post Office Broadband and Kcom customers (lien direct) |
Broadband providers Post Office Broadband and Kcom are among a number of operators to have been hit by a hack targeting Zyxel routing hardware |
|
|
|
|
2016-12-01 08:00:14 |
US and UK government expand surveillance powers (lien direct) |
The US has introduced wide new hacking powers for federal agents a day after the UK's Investigatory Powers Act firmed up bulk surveillance powers for intelligence and polices services |
|
|
|
|
2016-12-01 07:30:30 |
(Déjà vu) Security Think Tank: Cyber security is everyone\'s responsibility (lien direct) |
How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses? |
|
|
|
|
2016-12-01 05:15:02 |
Mozilla and Tor issue patches for Firefox flaw exposing Tor users (lien direct) |
Users of Tor anonymous browsing urged to update to the latest versions of relevant software to block an exploit that collects IP and MAC addresses to identify users |
|
|
★★★
|
|
2016-11-30 06:00:57 |
Thousands of National Lottery accounts hacked (lien direct) |
National Lottery operator Camelot says the log-in details of thousands of people who do the lottery online have been stolen |
|
|
|
|
2016-11-30 05:00:55 |
Disaster recovery testing: A vital part of the DR plan (lien direct) |
Disaster recovery provision is worthless unless you test out your plans. In this two-part series, Computer Weekly looks at disaster recovery testing in virtualised datacentres |
|
|
|
|
2016-11-30 04:15:00 |
(Déjà vu) Security Think Tank: Managing cyber risk requires genuine understanding (lien direct) |
How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses? |
|
|
|
|
2016-11-29 07:45:22 |
Security Think Tank: Cyber risk – Overlooked? Ignored? Under-appreciated? (lien direct) |
How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses? |
|
|
|
|
2016-11-29 05:33:31 |
Deutsche Telekom botnet attack underlines infrastructure vulnerabilities (lien direct) |
German telco says its broadband outages are linked to a botched attempt to hijack routers, which security experts say further underlines the cyber threat to internet connected infrastructure |
|
|
|
|
2016-11-28 19:15:21 |
IBM blamed for Australian census website crash (lien direct) |
Computer giant reportedly pays $30m to Australian government as reports are released from two inquiries into DDoS attacks on census website |
|
|
|
|
2016-11-28 07:15:00 |
San Francisco transport system hit by ransomware attack (lien direct) |
San Francisco's transport agency appears to be the latest target of cyber criminals using encryption malware to hold organisations to ransom |
|
|
|
|
2016-11-28 07:00:32 |
HMRC geared up to block 500 million phishing emails a year (lien direct) |
HMRC is first department to implement technology to block phishing emails as part of UK government's active cyber defence programme and self-testing strategy |
|
|
|
|
2016-11-28 06:00:53 |
Petition to force MPs to consider debate on surveillance bill (lien direct) |
Open Rights Group has called on parliament to debate the Investigatory Powers Bill and review it in light of pending court actions, after petition against the bill tops 100,000 signatories |
|
|
|
|
2016-11-25 09:45:13 |
Is the infomation security supplier market really consolidating? (lien direct) |
Mergers and acquisitions continue at pace in the information security market, but these are not necessarily signs of consolidation, writes Martin Kuppinger |
|
|
|
|
2016-11-25 07:45:14 |
One in four Wi-Fi hotspots vulnerable to attack, study finds (lien direct) |
At least one in four Wi-Fi hotspots are open to attack, a study by Kaspersky Lab reveals |
|
|
|
|
2016-11-25 06:30:31 |
US Navy breach highlights third-party cyber risk (lien direct) |
The personal details of more than 130,000 current and former US Navy personnel have been exposed in a breach linked to the compromise of third-party supplier's laptop |
|
|
|
|
2016-11-25 04:04:53 |
UK firms neglecting cyber security, say 74% of IT managers (lien direct) |
Most UK firms lack the time and resources to ensure adequate cyber security and data protection, according to a survey of IT managers |
|
|
|
|
2016-11-24 09:46:06 |
Customer data integration a market opportunity, says CXP Group consultant (lien direct) |
Technology and service providers should focus on customer data integration to help businesses improve customer satisfaction, says CXP Group consultant Nicole Dufft |
|
|
★★★
|
|
2016-11-24 07:30:31 |
Gigya is consumer identify leader, finds KuppingerCole (lien direct) |
Gigya, Ping Identity, Salesforce, ForgeRock are the current leaders in the consumer identity and access management market, according to a report by KuppingerCole |
Guideline
|
|
|
|
2016-11-24 06:16:24 |
Bletchley Park to teach teenagers to become cyber experts (lien direct) |
A cyber security college is to be set up at Bletchley Park, home to the men and women who decoded German cyphers during the Second World War |
|
|
|
|
2016-11-24 05:30:56 |
A single, integrated consumer ID system is best, says Martin Kuppinger (lien direct) |
A bi-modal, integrated IAM system will help avoid the pitfalls associated with other approaches to consumer identity, according to Martin Kuppinger |
|
|
|
|
2016-11-23 04:45:42 |
High-assurance identity top priority for government and finance (lien direct) |
The UK government and financial sector is working together to meet the need for high-assurance identity globally |
|
|
|
|
2016-11-23 02:08:43 |
Customer identity evolves over time, says Gigya (lien direct) |
Customer identity evolves through a series of interactions to enable richer data for improved marketing and customer experiences, says Gigya co-founder Rooly Eliezerov |
|
|
|
|
2016-11-22 19:15:40 |
Alibaba brings public cloud to the Middle East (lien direct) |
Alibaba has opened a datacentre in Dubai to attract businesses in the Middle East to its public cloud services |
|
|
|
|
2016-11-22 08:45:00 |
Consumer identity key to digital transformation (lien direct) |
Customer identity and access management has benefits for consumers and service providers alike, but is key to digital transformation, says KuppingerCole |
|
|
|
|
2016-11-22 06:56:51 |
Alleged hacker Lauri Love\'s \'life will be destroyed\' under Trump regime (lien direct) |
Supporters fear for activist Lauri Love if his extradition to face hacking charges to the US goes ahead |
|
|
|
|
2016-11-21 05:52:55 |
Fight against Investigatory Powers Bill may not be over (lien direct) |
Labour's shadow home secretary Diane Abbott says that wider society must now debate the controversial Investigatory Powers Bill, despite Parliamentary approval |
|
|
|
|
2016-11-18 12:00:40 |
Three breach highlights several security issues, says (ISC)2 (lien direct) |
Customer data breaches continue to demonstrate that companies are still not treating cyber risk like every other business risk, says Adrian Davis of (ISC)2 |
|
|
★★★★★
|
|
2016-11-18 07:04:45 |
European security industry has failed users, says expert (lien direct) |
Cryptology expert Bart Preneel says the European security industry must commit to secure communication for the masses and open source is the key to secure infrastructure |
|
|
|
|
2016-11-18 04:41:35 |
Hackers arrested in Three mobile upgrade scam (lien direct) |
Three men arrested in connection with mobile handset upgrade fraud enabled by unauthorised access to customer data |
|
|
|
|
2016-11-17 08:15:01 |
One million cyber attacks on UK retailers forecast for Christmas (lien direct) |
Cyber attacks on internet shopping are expected to increase in the run up to Christmas, with a million attacks targeted at UK retailers alone |
|
|
|
|
2016-11-17 06:30:33 |
Investigatory Powers Bill looks set to become law (lien direct) |
Rights groups have vowed to continue to oppose the controversial Investigatory Powers Bill, which is now just two steps away from becoming law |
|
|
|
|
2016-11-17 05:25:09 |
(Déjà vu) Security Think Tank: Cyber insurance may not provide cover where it is most needed (lien direct) |
What should organisations consider if they are to prepare for cyber insurance? |
|
|
|
|
2016-11-16 10:30:45 |
Digital transformation not a finite process, says Martin Kuppinger (lien direct) |
Security, privacy and identity are key to digital transformation, which is an evolutionary process, according to Martin Kuppinger |
|
|
|
|
2016-11-16 07:30:44 |
Business needs AI defence against AI attacks, says Darktrace (lien direct) |
Cyber attackers are turning to machine learning to create smarter attacks and defenders will require similar technology to detect them, warns Darktrace |
|
|
|
|
2016-11-16 05:30:27 |
(Déjà vu) Security Think Tank: Ensure cyber insurance is right and helps reduce risk (lien direct) |
What should organisations consider if they are to prepare for cyber insurance? |
|
|
|
|
2016-11-16 05:15:33 |
Adobe uses shared responsibility to meet security challenges (lien direct) |
Adobe discovers ways of addressing security challenges of scalability, diverse technology stacks and business criticality |
|
|
|
|
2016-11-15 10:30:42 |
Identity for online gambling industry a potential market opportunity (lien direct) |
Identity for online gambling presents a potential market opportunity, because no suppliers are meeting the industry's consumer identify requirements |
|
|
|
|
2016-11-15 09:03:36 |
Online identity needs to be fixed, says Microsoft\'s Kim Cameron (lien direct) |
Software giant's identity architect calls on enterprises to professionalise the way they relate to customers to help replace online identity infrastructure that is not fit for purpose |
|
|
|
|
2016-11-14 07:30:09 |
The internet of things data explosion and storage and compliance (lien direct) |
Vigitrust's Mathieu Gorge reports from Web Summit 2016 on the explosion of data that comes with the internet of things and its implications for data storage and compliance |
|
|
|
|
2016-11-14 07:00:41 |
CIO interview: Marc Touitou, the World Health Organisation (lien direct) |
Ebola was a wake-up call. Marc Touitou joined the World Health Organisation as the outbreak started and set about being a catalyst for change |
|
|
|
|
2016-11-14 04:50:26 |
(Déjà vu) Security Think Tank: Lower insurance premiums through security certification (lien direct) |
What should organisations consider if they are to prepare for cyber insurance? |
|
|
|
|
2016-11-14 04:04:50 |
412 million user accounts exposed in FriendFinder Networks hack (lien direct) |
Another huge data breach has exposed poor security of user details and continued poor user password practices |
|
|
|
|
2016-11-11 12:00:15 |
(Déjà vu) Security Think Tank: Six key factors in cyber insurance (lien direct) |
What should organisations consider if they are to prepare for cyber insurance? |
|
|
|
|
2016-11-11 11:15:26 |
National Cyber Security Centre to trial cyber defence initiatives on government (lien direct) |
NCSC technical director Ian Levy details some of the initiatives being pursued as part of its Active Cyber Defence Programme |
|
|
|
|
2016-11-11 08:39:49 |
GDS aiming for 25 million users of Gov.uk Verify by 2020 (lien direct) |
Early draft of new GDS strategy reveals an ambitious target for its identity assurance service |
|
|
|
|
2016-11-11 06:45:36 |
Russian banks hit by IoT-enabled DDoS attacks (lien direct) |
DDoS attacks on Russian banks have been linked to IoT botnets, further confirming this worrying trend and highlighting the need for IoT suppliers to improve security capabilties |
|
|
|
|
2016-11-11 04:03:43 |
24 cyber criminals arrested in Europol operation (lien direct) |
Romanian police arrest 24 members of a card skimming and cloning operation and identify 47 other suspects |
|
|
|