|
|
Trusteer’s research group has found that 30% of attacks against websites that use two-factor authentication are now utilizing real-time man-in-the-middle techniques to bypass this trusted security mechanism. These findings are based on monitoring of thousands of Phishing attacks.
Continue reading According to Trusteer 2FA powerless against Real time phishing attacks
With over 22,000 students, 800 teaching staff and 800 visiting lecturers, the University of Westminster prides itself on the ability to offer the best resources to facilitate learning. Undergraduates make up 75 per cent of students and more than 5,000 are international students from over 150 countries. Westminster is in the top 15 of most popular UK universities for international students and continuing to attract over-seas students is an important business driver for the organisation.
Continue reading Improved IT attracts students looking for access to the best resources
London, 18 Oct 2010 – Britain has published it’s National Security Strategy (NSS) which aims to inform thinking and drive policy over coming years. The document categorises threats faced by the nation in tiers highlighting the level of severity, outlines actions to be taken to mitigate such threats and formed the background to the Strategic Defence Review (SDR).
Continue reading National security strategy emphasises need for coordinated approach to counter-terrorism
18th October 2010 – Reports are coming in that an unencrypted USB stick – apparently containing details on the Sellafield nuclear site’s operations – was found by a coach driver in a Cumbria hotel room. And, says Credant Technologies, the endpoint data security specialist, it seems that the USB stick contained details of the nuclear firm’s proposed workforce transfer from its Capenhurst operation in Cheshire to uranium specialist Urenco.one.
Continue reading Nuclear secrets revealed after unencrypted USB stick found in Cumbria hotel room
A TEEN who refused to give police officers an encryption password for his computer has been jailed for four months. The case is believed to be the first of its kind in Lancashire. Oliver Drage, 19, formerly of Naze Lane, Freckleton, was arrested in May 2009.
Continue reading PASSWORD TEEN JAILED
The ZeuS malware is coming of age and the infections are going to get a lot worse says Trusteer, the secure browsing services specialist. ZeuS malware has already been pushed extensively to users of Web 2.0 and/or social networking sites plus services such as Facebook, Twitter and, most recently, to users of the business social networking site, LinkedIn. Malware is also being modified by cybercriminals using coding toolkits to attack smartphone users. Recent postings by our IT security colleagues at S21sec about ZeuS targeting smartphone users are just the tip of the iceberg when considering the potential of these attacks.
Continue reading New Zeus malware attacks Smart phone and LinkedIn users
A simple mistake caused by the recipient auto-complete function within an email client resulted in Gwent Police committing what has been referred to as the first major UK data security breach since the new regulations introduced by the Information Commissioner’s Office came into force in April this year.
Continue reading How many police officers does it take to email 10,000 criminal records to a journalist by accident?
What do you get when the worlds leading analysis and data software provider merges with a leading open source intelligence research institute? Hopefully an even more successful business providing data faster and more accurately to its service users. At least that is the outcome i2 CEO Robert Griffin is hoping for as he heralded the group’s newly formed partnership with risk intelligence specialists World Check at its Brussels client conference in June.
Continue reading I2 Marriage made in Heaven
With October’s Spending Review announcement set to reveal the scale of the requirement for a radical re-evaluation of the Government’s role in providing public services; a two-day conference and exhibition in Birmingham on October 20th – 21st will provide the best opportunity this year to learn how digital technologies offer a proven route to delivering better public services for less.
Continue reading BEYOND 2010 TO SHOW DIGITAL TECHNOLOGY'S ROUTE TO EFFICIENCY AND REFORM
Overtis , vendor of VigilancePro, user activity management software, has announced a new Protective Marking feature to identify files that hold confidential information. The new feature has been developed in response to requests from UK police forces, to help them to comply with Management of Police Information Guidance published by the National Policing Improvement Agency (NPIA) on behalf of the Association of Chief Police Officers (ACPO).
Continue reading Overtis secures protectively marked Police files
The Royal Marsden is a National Health Service (NHS) Foundation Trust in England that specialises in cancer. Situated primarily over two main sites, one in Chelsea and one in Sutton, it also has a number of satellite locations, an area of the business that is being developed. Today, it has a staff of approximately 2,500 all of whom, in one form or another, are responsible for protecting the data they access.
Continue reading IronKey Stands Shoulder to Shoulder with The Royal Marsden to Secure Data
As CEO of i2, Bob Griffin reminded his audience at the recent i2 EMEA User Conference held in Brussels, of what has changed at i2 during the past 12 months.
Continue reading i2 aims to 'accelerate your mission with transformational technologies'
London, 24th August 2010 – Whilst the media seems pre-occupied with the problems of cybercriminals and hackers causing problems for organisations from outside their network, a survey just published shows that 23 per cent of UK employees will take customer lists and other sensitive data when they leave their employer.
Continue reading Imperva says employee survey highlights dangers of insider threat
London and San Mateo, Calif., August 24, 2010 , An in-depth survey carried out amongst 100 of the elite IT professionals attending this year’s DEF CON 2010 Hacker conference in Las Vegas recently has revealed that hackers view the cloud as having a silver lining for them.
Continue reading DEF CON survey reveals vast scale of cloud hacking – and the need to bolster security to counter the problem
The Liberal Democrats are taking advantage of Web 2.0 technology to help run their headquarters, improve communication within the party and share materials with campaigners across the UK.
Continue reading The Liberal Democrats enter a new era for government and embrace Web 2.0
London, 28th July 2010 Trusteer, the leading provider of secure browsing services, today announced that it has added financial malware disinfection to its Rapport service. In addition to preventing Trojans like Zeus, Silon, Bugat, DBJP and zero day malware from tampering with website communications and transactions, Rapport now removes malicious code that attempts to attack browser sessions.
Continue reading Trusteer Adds Free Financial Malware Removal to Rapport Secure Browsing Service
i2, the leading provider of intelligence and investigation software, has formed a formal partnership with leading risk intelligence specialist, World-Check. As a result, i2 customers can benefit from the ability to access highly structured information and create actionable intelligence faster. A new solution was announced here today at i2’s Europe, Middle East & Africa (EMEA) User Conference.
Continue reading i2 and World-Check Combine World-class Analytical Tools with World-class Intelligence
The world of hacking has evolved into two major varieties: industrialized attacks and advanced persistent threats (APT). There has been a lot of discussion around the validity of APT recently some have even connected APT with panties. But APT is a real threat. So, what’s the difference between APT and industrialized hacking, and how should you respond?
Continue reading A Tale of Two Hacks:
Rolling Meadows, Ill., US (9th June 2010), ISACA International Vice President Rolf von Roessing, CISA, CISM, CGEIT, has applauded the actions of Ireland’s Data Protection Commissioner in publishing a draft code of practice that requires incidents involving the theft or loss of personal data relating to more than 100 people to be notified to its office.
Continue reading ISACA leader welcomes Irish Data Protection Commissioner's proposals on data theft or loss notifications
The British Library is the national library of the United Kingdom and is one of the world’s greatest research libraries. The purpose of the British Library is to retain the nation’s knowledge and memory and as such, every item that is deposited in the British Library is accessible for readers on site. Currently, it holds over 150 million items in different formats including books, magazines, newspapers, maps, patents, stamp collections and recordings.
Continue reading British Library 2.0
|
NEED AN UP TO DATE DATABASE?
|
Recent Comments