IT Pro Panel: How the IoT will change your business

Analysis & Insight 24 Apr, 2015 Joe Curtis

Our panel of experts discusses the pros and cons of the Internet of Things

Hackers can abuse Galaxy S6 fingerprint tech

News 24 Apr, 2015 Clare Hopping

According to security researchers, a flaw in Android enables hackers to steal personal information from devices

You have 60 minutes to respond to a cyber attack

News 22 Apr, 2015 Joe Curtis

Intel identifies “golden hour” response time, but UK firms take up to three months

Why BT's hacking connected cars - before criminals do

Analysis & Insight 22 Apr, 2015 Nicole Kobie

Connected cars pose a security risk that needs addressing

Is this new zero-day dark market the real deal?

Analysis & Insight 21 Apr, 2015 Davey Winder

Davey Winder takes a look at the latest market to appear on the dark web and ponders whether it's a sting operation...

Next-gen security could see human embedded passwords

News 21 Apr, 2015 Clare Hopping

PayPal said it's the most effective way to stop people using easily guessed passwords

Best antivirus software 2015

Reviews 17 Apr, 2015 Rene Millman

Which anti-virus products offer most protection?


Aeroplane Wi-Fi vulnerable to hacks, FAA report reveals

News 17 Apr, 2015 Clare Hopping

The research by the US Government Accountability Office warned IP networks leave flights open to cyber attacks

Dropbox reveals bug bounty scheme

News 17 Apr, 2015 Clare Hopping

The minimum payout will be $216, but there's no maximum

New threats, old tricks

Analysis & Insight 16 Apr, 2015 Stephen Pritchard

Verizon's latest Data Breach Investigations Report finds hackers using old techniques to compromise corporate IT and steal data

London Tube sign

TfL workers' tablet usage doubles in two years, reveals FoI

News 16 Apr, 2015 Caroline Preece

But the thousands of devices in use by underground workers raises security issues

Target settles for $19m with MasterCard after huge data breach

News 16 Apr, 2015 Joe Curtis

US retailer makes offer after leaking 40 million credit card details

White House

Edward Snowden's in the White House, according to Google Maps

News 16 Apr, 2015 Clare Hopping

Cyber expert Bryan Seely placed Edward Snowden in the White House through Google Maps loophole

security key on keyboard

Verizon: Patch old vulnerabilities or be exploited

News 15 Apr, 2015 Joe Curtis

Malware hits firms who’ve failed to patch vulnerabilities dating back to 2007


US lottery security head 'fixed results'

News 15 Apr, 2015 Clare Hopping

Eddie Raymond Tipton allegedly hacked into the draw's computer to ensure he won the jackpot


Dell and Symantec reports paint worrying cyber security picture for the year ahead

News 14 Apr, 2015 Caroline Preece

Cyber security fears abound if the latest research is anything to go by...

Great Cannon brings down Github and

News 14 Apr, 2015 Clare Hopping

China's new cyber weapon has been designed to stop its citizens reading articles it doesn't agree with


Lib Dems promise Digital Bill of Rights if elected

News 13 Apr, 2015 Joe Curtis

Party vows to protect cyber security and promises prison time for data thieves

China accused of 10-year cybercrime campaign

News 13 Apr, 2015 Adam Shepherd

Were attacks across Southeast Asia sponsored by the Chinese government?

Your iPhone and iPad are at risk from Darwin Nuke

News 13 Apr, 2015 Clare Hopping

Apple customer? Kaspersky's just uncovered a new denial of service flaw affecting your devices