Security

RSS FeedSecurity also in this channel

Security Newsletter

Latest News

Hackers exploit router flaws in unusual pharming attack

Hackers exploit router flaws in unusual pharming attack

The technique exploited security flaws in home routers to gain access to the administrator console. Once there, the hackers changed the routers' DNS (Domain Name System) settings, a type of attack known as pharming. read more »

John Lewis mail glitch leaves customers with £1.53 bill for marketing circular

An unknown number of John Lewis and Waitrose customers have been asked to pay a £1.53 postage charge by the Royal Mail after a franking machine failed to correctly stamp letters sent out as part the firm’s latest credit card marketing campaign. read more »

Insurance firm Staysure fined £175,000 for 'unbelievable' credit card hack

The ICO has handed online insurance firm Staysure.co.uk a stinging £175,000 fine after chaotic security practices allowed hackers to steal details of 100,000 credit card numbers from the firm’s database, several thousand of which experienced fraud. read more »

Europol and security vendors disrupt massive Ramnit botnet

European law enforcement agencies seized command-and-control servers used by Ramnit, a malware program that steals online banking credentials, FTP passwords, session cookies and personal files from victims. read more »

Google focuses on Pwn2Own and drops Pwnium hack contest

Google is shutting down its Pwnium hacking contest, which it has held alongside the better-known Pwn2Own challenge each spring since 2012. read more »

more news ..
Advertisement

Lexmark

Windows Server 2003 Migration: what you need to know

Support for Windows Server 2003 ends in July 2015, ComputerworldUK Editor Mike Simons discusses the migration options with Dell and Microsoft. Find out more


Google Nexus series

Google Nexus series

The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.


Webcast

Part 2 of your journey to virtualisation

Explore how you can improve your servers, storage and networks by developing your infrastructure.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


In Depth

The NSA is inside hard drive firmware - now what?

It’s been almost five years since the discovery of Stuxnet disabused the world of its naivety about nation state malware but since then more attention has been paid to Edward Snowden’s NSA hacking revelations than the occasional technical insights into old-style spying software. read more »

The $1 billion ‘Carbanak’ bank heist - how it was done

At a time when physical money makes up a shrinking 8 percent of the currency in circulation, the ATM has become a reminder that people still love taking paper money out of holes in the wall. According to a Kaspersky Lab investigation, leaked to the New York Times at the weekend, we have been reminded that some of the technology’s biggest fans turn out to be criminals. read more »

Cybercrime happens - deal with it!

Like the internet, cybercrime is here to stay and we have to learn to live with it. That means looking afresh at the technological, procedural and regulatory steps needed to ensure cyber-security. read more »

Most serious data breaches could be avoided, new analysis claims

The overwhelming majority of high-profile US data breaches could have been prevented by sticking to a dozen security practices, according to the Online Trust Alliance (OTA) which has outlined the most critical in a new report. read more »

3 low-tech threats that lead to high-profile breaches

In an age where data security defenses are getting more and more sophisticated, there will be increased pressure for malicious parties to glean information from within the organization's walls or public places. read more »

more in depth ..
Most Popular in Security

The NSA is inside hard drive firmware - now what?

Experts agree firmware attacks are possible. But until the Equation group report nobody was worried

John Lewis mail glitch leaves customers with £1.53 bill for marketing circular

Unknown number asked for payment by Royal Mail

The $1 billion ‘Carbanak’ bank heist - how it was done

And still the bank industry keeps quiet

Healthcare and banks fall short on spam and phishing protection

Agari's TrustIndex 2014 names the leaders - and laggards

White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..
Advertisement
Blogs

Reforming banking's culture of security secrecy

Recent bank malware attacks are telling us that security through obscurity is no longer enoughread more »

Cybersecurity utilities: The future of managed security services

Cloud Will Transform Managed Security Servicesread more »

more blogs ..
Solution Centres

Securing the Enterprise

Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals


HP Data Protection Zone

HP Data Protection Zone

HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...


Agile Data Center

Transition to the Agile Data Center

Explore the importance of the agile data center to the business, and ideas on how IT can make this transition


Advertisement

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message