The Silk Road trial has concluded, with Ross Ulbricht found guilty of running the anonymous online marketplace for illegal goods. But questions remain over how the FBI found its way through Tor, the software…
Following the trend of giving catchy names to serious operating system security flaws, the Linux vulnerability revealed recently by security researchers Qualys has been called Ghost. Like Heartbleed and…
The financial institutions of the City of London and Wall Street are to take part in a series of “war game” exercises aimed at testing their resilience to cyber attack. The announcement comes as prime…
Hacking and making a profit isn’t as easy as it looks.
Reuters
In the wake of the latest high-profile hack of Sony and claims of “cyber-vandalism” being thrown about, it’s normal to feel a sense of unease. Just this week, yet another proposal for new cybersecurity…
Is it a crime scene or just a store checkout? Could be both.
Marlith
Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click “purchase…
Digitising public services and putting them online to reap the cost and efficiency benefits is something that’s been tried with varying degrees of success. The UK government’s “digital by default” policy…
We should know by now - don’t click that link.
Bill Buchanan
A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat to information security is…
First rule of advertising: don’t believe the advertising.
Bloomua/Shutterstock
At the recent Information Security Solutions Europe conference, former White House cybersecurity adviser Howard Schmidt claimed that most security threats may be persistent, but are not as “advanced” as…
Call that security? How safe is your own password from hackers.
Flickr/Victor Bayon
In 2004 Bill Gates pronounced usernames and passwords dead. Gates, a man consistently thinking ahead of the crowd, was right. Most of us – including our employers and the online services we rely on – just…
Apple computers could be at risk from the latest Bash bug.
Flickr/Oliver
A serious security flaw has been discovered in a ubiquitous utility program present on a wide variety of important computer systems, including many Unix-based servers and Macintosh desktop computers. “Shell…
Stolen credit card details, cheaper by the dozen when you buy online.
Chris Young/PA
Imagine if UK banks decided to send out new credit cards to all their customers, but they were all “lost in the post” and the details ended up for sale on some dubious website. The recently discovered…
Does anyone have an easier question?
EPA/Drew Angerer
Digital mass surveillance is having a chilling effect on US democracy, affecting journalists and lawyers, a report from human rights organisations has warned. The report, by Human Rights Watch and the…
Don’t worry boys, I’ll have the NSA delete it for me.
White House
If you’re selling an old Android smartphone on an online auction site you could be giving away rather more than you intend to, according to a recent investigation by anti-malware company Avast. Going through…
Beware: most worms aren’t this friendly.
Dan Hatton
Google’s Android now dominates 80% of the smart phone market. Of the major phone operating systems, Android is the most vulnerable to security breaches and yet perceptions haven’t caught up with reality…
A grid of human faces could be our next line of defence in protecting identity.
Jesper Dyhre Nielsen/Flickr
One of the problems with using passwords to prove identity is that passwords that are easy to remember are also easy for an attacker to guess, and vice versa. Nevertheless, passwords are cheap to implement…
There are many tales in literature over millennia about people selling their soul to a malevolent deity for the right price. But at least it’s usually a good price. Recent research has discovered that…
It’s little wonder that computer experts are warning that computer users could be experiencing “notification fatigue” after the past few weeks. But even if you’re feeling overwhelmed following the Heartbleed…
What do you mean ‘IHATECAT’ is not a strong password?
konsvi
Several high-profile security breaches have, of late, got many people wondering about their passwords. It would be great news if I could tell you a perfect sure-fire system to manage your passwords; the…
iPhone users in Australia were greeted with an alarming message this week when they tried to use their devices. They were told that a hacker or group of hackers going by the name Oleg Pliss had taken control…