Articles about It Security

IT security spending to hit $75.4bn in 2015 despite currency issues, says Gartner

Worldwide spending on information security will reach $75.4bn in 2015 – an increase of 4.7 per cent over 2014 – despite a currency-driven price hike causing some customers to delay purchases until next year. Government initiatives, increased legislation and high-profile data breaches are the hot topics shaping the latest …
John Leyden, 23 Sep 2015

Android Security: How's BlackBerry going to fix it?

Analysis “Android Security” sounds like an oxymoron, perhaps the biggest since “friendly fire”. So what’s BlackBerry, which has forged a reputation on enterprise security, thinking with the new Priv device? BlackBerry's handset division is promising to create a business-friendly secure 'droid, and it’s recently been explaining just how …
Andrew Orlowski, 26 Oct 2015

UK finance sector: IT security testing 'becoming close to mandatory'

Regulators are nearly at the point of requiring major financial services companies to participate in a cyber security testing programme, according to the Bank of England. Minutes from a meeting of the Bank's court of directors on 16 September (10-page / 45KB PDF) provide detail of some of the efforts being taken to improve " …
OUT-LAW.COM, 30 Oct 2015

German Govt mulls security standards for SOHOpeless routers

The German Government is mulling an assessment of the security chops of consumer routers in a bid to lift current abysmal standards and help inform buyers. Berlin's Ministry of the Interior IT security office says it wants to test routers for support of security features like WPS, encryption, and brute force protection of …
Darren Pauli, 21 Oct 2015
Jeff Moss

IT security staff have a job for life – possibly a grim, frustrating life

Black Hat 2015 Speaking at the opening of the 18th Black Hat security conference, its founder Jeff Moss warned the assembled throng that while they might have job security, they weren't going to have fun in the next decade. "We are all employed for life," Moss said. "It's interesting, I see problems and challenges and on one hand am really …
Iain Thomson, 05 Aug 2015

Raytheon: Ho hum, another day, another $1bn cyber-security contract with Uncle Sam

Defense contractor Raytheon said it will be providing IT security for more than 100 US government agencies in a deal valued at upwards of $1bn. Raytheon said the billion-dollar contract, reportedly set to run for five to seven years, will include development and support of cybersecurity protections for the Department of …
Shaun Nichols, 30 Sep 2015

Lottery IT security boss guilty of hacking lotto computer to win $14.3m

Iowa state lottery's IT security boss hacked his employer's computer system, and rigged the lottery so he could buy a winning ticket in a subsequent draw. On Tuesday, at the Polk County Courthouse in Des Moines, Iowa, the disgraced director of information security was found guilty of fraud. Eddie Tipton, 52, installed a …
Iain Thomson, 22 Jul 2015
£10 notes. Pic: Howard Lake

Show us your security chops with the Cyber 10K challenge

Competition NCC Group has devised a lovely cyber security competition, Cyber 10K, which sees the winning contestant receive £10,000 and expert advice from the company to develop their own security solution.Enter and find out more here. We like the Cyber 10K concept so much that El Reg’s very own John Leyden, who has covered the IT …
David Gordon, 20 Aug 2015

Want security? Next-gen startups show how old practices don't cut it

Sysadmin Blog In case you hadn't noticed, IT security sucks. There is a chronic lack of people trained in IT security, people who will listen to IT security, and even a lack of agreement on how best to go about IT security. Fortunately, a new generation of startups are helping to tackle the issues. No matter how good a sysadmin you think …
Trevor Pott, 22 Aug 2015

Hacked US OPM boss: We'll fix our IT security – just give us $21 million

The boss of the US government's thoroughly ransacked Office of Personnel Management has – rightly – come in for a rough ride from members of the House Committee on Oversight and Government Reform. Politicians on both sides of the trenches tore strips off the lamentable state of security in the agency, which was raided by …
Iain Thomson, 16 Jun 2015

Who should be responsible for IT security?

Typically, when a cybersecurity problem arises, it’s the IT department that gets it in the neck. Ostensibly, that makes sense. After all, if someone is in your network mining your database for corporate secrets, it’s hardly the office manager or the accounts receivable department’s lookout, right? Perhaps. On the other hand, …
Danny Bradbury, 18 Aug 2015

The weapons pact threatening IT security research

Analysis The US government has rewritten chunks of an obscure weapons trade pact between itself, Europe, Russia, and other nations – a pact that is now casting its shadow over today's computer security tools. Dubbed the Wassenaar Agreement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies, the treaty limits who …
Iain Thomson, 06 Jun 2015
Booth babe banhammer

Bye bye, booth babes. IT security catwalk RSA nixes sexy outfits

The organizers of this year's RSA security conference have made at least one thing clear to exhibitors: no booth babes. The industry shindig has sent out a new dress code banning scantily clad models, regardless of gender, from wandering the show floor. The rules dictate that exhibitors cannot wear shorts, tank tops and halter …
Shaun Nichols, 26 Mar 2015

Hidden password-stealing malware lurking in your GPU card? Intel Security thinks not

Fears that malware is hiding in people's graphics chipsets may be overclocked, according to Intel Security. Earlier this year, researchers from the self-styled “Team JellyFish” released a proof-of-concept software nasty capable of exploiting GPUs to swipe passwords and other information typed in by a PC's user. The same …
John Leyden, 01 Sep 2015
Panic button

SIM hack scandal biz Gemalto: Everything's fine ... Security industry: No, it's really not

Six days ago Gemalto, the world's largest SIM card manufacturer, was told that back in 2010 it had been ransacked by NSA and GCHQ hackers. Today the company gave itself the all-clear: no encryption keys, used to secure phone calls from eavesdroppers, were stolen, it claims. Yet the IT security industry is not so sure. Documents …
Iain Thomson, 25 Feb 2015
Fail and You

NASDAQ IT security spend: $1bn. Finding mystery malware on its servers: Priceless

NASDAQ servers were infected by malware that exploited two mystery zero-day vulnerabilities, according to a magazine cover story published today. Despite spending a ton of money on computer security, the stock exchange was wide open to attack, we're told. Today's report pulls back the curtain back to reveal a little more about …
Iain Thomson, 17 Jul 2014

Conficker is back – and it's infecting police body cams

A US IT security company says it found copies of the Conficker malware infecting police body cameras. Florida-based iPower reports that body cameras it received from supplier Martel Electronics were loaded with 2009's baddest botware. Researchers Jarrett Pavao and Charles Auchinleck found that when plugged into a PC, the …
Shaun Nichols, 14 Nov 2015

Sony finds some loose change, flings most of it at lawyers ... the rest at staff hit by 'North Korea'

Sony Pictures Entertainment (SPE) has agreed to pay up to $8m (£5.18m) to settle a lawsuit stemming from its 2014 IT security meltdown. The movie studio will pay out damages after the personal details of 47,000 current and former employees leaked onto the internet following a network breach said to have stemmed from its …
Shaun Nichols, 21 Oct 2015

Spanish election site in security cert warning screwup snafu

Updated Website crypto problems on the Spanish online voting registration website are causing it to generate all manner of security warnings. Attempts to visit the site – run by Spain's National Statistics Institute and introduced this year for municipal/regional elections – typically lead to users being confronted with …
John Leyden, 13 Apr 2015
Sad Anonymous

US Census Bureau IT systems hacked, data leaked by Anonymous

Anonymous hackers have swiped databases from servers used by the US Census Bureau, and dumped their contents online. The bureau, as you might imagine, collects information on the American population every 10 years – although the leaked data does not include citizens' census records. The purloined bureau databases include the …
Chris Williams, 23 Jul 2015
Photo of the White House at dusk

White House to world: We don't hoard IT security vulnerabilities

Backing up the NSA's claim that it was caught by surprise by the Heartbleed OpenSSL bug, the White House has tried to explain the rules under which it allows agencies to hoard security vulnerabilities. In this White House blog post, cybersecurity coordinator Michael Daniel says leaving a huge number of vulnerabilities …
Flipside RFID-shielded wallet

Your security is just dandy, Apple Pay, but here comes Android

Analysis Most security experts estimate that the security offered within (and by) Apple Pay is superior to that seen in existing contactless credit or debit card systems. However, the success of the technology in the UK may well depend more on commercial factors than anything else, with one payments expert warning that merchants fees …
John Leyden, 16 Jul 2015
Cloud security

Cloud Security Temperature Check

Survey Results It is increasingly common for users and business groups to drive their own adoption of cloud services. But even where IT is involved, as organisations ramp up their use of cloud, activity is often uncoordinated. Pulling the threads together across service silos to manage risks effectively can be a challenge. The right strategy …
Dale Vile, 20 May 2015

Would you hire a hacker to run your security? 'Yes' say Brit IT bosses

More than two in three IT professionals would consider ex-hackers for security roles, providing they have the right skills to do the job, a survey has found. In addition, 40 per cent of respondents to CWJobs' survey of 352 IT bods reckoned there aren't enough skilled security professionals in the UK technology industry. As if …
John Leyden, 30 Sep 2013
Keep out sign with deleted expletive

US watchdog: Anthem snubbed our security audits before and after enormous hack attack

A year or so before American health insurer Anthem admitted it had been ruthlessly ransacked by hackers, a US federal watchdog had offered to audit the giant's computer security – but was rebuffed. And, after miscreants looted Anthem's servers and accessed up to 88.8 million private records, the watchdog again offered to audit …
Shaun Nichols, 05 Mar 2015

Last call for the NCC Group Cyber 10K challenge

Competition The November 30 deadline for entering NCC Group’s Cyber 10K challenge is coming up fast – so get those entries in now. To recap, the Cyber 10K is designed to encourage students and recent grads to take up careers in IT security. NCC Group challenges entrants to put forward fresh and innovative ideas to help solve cyber security …
David Gordon, 26 Nov 2015

Students! Graduates! Win £10,000 with the Cyber 10K challenge

Competition In a bid to help address the cyber skills gap in the UK, NCC Group is calling on Britain’s students and graduates to solve the cyber security challenges both businesses and consumers face today. The winner of the Cyber 10K challenge will receive £10,000 and expert advice from the company to develop their own security solution …
David Gordon, 14 Sep 2015

Malware, restoring data: What keeps data center techies up all night

A majority of organizations polled in a data center and cloud security survey are dissatisfied with their malware containment and recovery times. More than half (55 per cent) of survey respondents were dissatisfied with the length of time it takes them to contain and recover from hacker infiltrations and malware infections, …
John Leyden, 15 Oct 2015
IT Crowd. Source: Channel 4 / 2entertain

'Shadow IT' gradually sapping power and budget from CIOs

The CIO's power over IT budgets is being slowly eroded, with spend now increasingly dispersed throughout organisations, according to a survey of 1,000 IT "decision-makers". The research from BT said CIOs now face a "Darwinian moment", with 76 per cent reporting unauthorized "shadow IT" within their businesses - an element that …
Kat Hall, 15 Dec 2014

UK biz email slinger Mimecast files for $100m IPO in US

Mimecast filed for an initial public offering on Wall Street on Friday and said it hoped to raise up to $100m (£64m). The London-based email security vendor, which has 14,500 biz customers on its books, said that it planned to list under the symbol "MIME" on the Nasdaq exchange. For its most recent quarter, Mimecast – which …
Kelly Fiveash, 19 Oct 2015
US cashpoint. Pic: Tax Credits

Are you an infosec bod? You must be STINKING RICH, says study

Jobs in the lucrative cyber-security sector can command salaries of $200,000 or more, according to a new salary survey. Lead software security engineer pull in an average of $233,333 while Chief Security Officer ($225,000) and Global Information Security Director ($200,000) also receive serious salaries. A new study of 2015 …
John Leyden, 12 May 2015

Big data minnow swallowed by security player Accumuli

AIM-listed specialist security player Accumuli has coughed £1.9m for small Bracknell-based big data analytics reseller and integrator EQUALIS, it confirmed to the City today. This bolt-on-buy adds a seven-strong band of big data boffins that sell software from Splunk - for which EQUALIS is Blighty's only authorised training …
Paul Kunert, 02 Dec 2013
The Register breaking news

Putting the security jigsaw together

Reg reader research Effective IT security is both important and hard to implement, and it isn’t getting any easier. Central systems are becoming more complex, and keeping up with the ever-changing threat landscape is an ongoing challenge. Then there's the fact that end users are more mobile than ever and increasingly reckon they should be able to …
Tony Lock, 06 Sep 2013

Security products: Best of breed or create your own monster?

IT security is not just about antivirus or firewall products anymore. There is a whole layer cake of different product types designed to protect your organisation in different ways. It is a stack, in much the same way as TCP-IP networking or web server functionality has stacks of functionality. The question is, what's the best …
Danny Bradbury, 07 Nov 2014
Airplane! Source: Paramount Home Entertainment

Biz founded by Chris 'I hack airplanes' Roberts files for bankruptcy

One World Labs, the infosec biz founded by Chris Roberts – the security expert famous for allegedly making an airplane move sideways mid-flight without leaving his passenger seat – has filed for bankruptcy protection. The Wall Street Journal reports One World Labs filed for bankruptcy last week, with debts roughly mounting to …
John Leyden, 09 Oct 2015
The Register breaking news

A woman in IT is like a dog who speaks: Rare. A woman in IT security?

Women are shunning cyber security even more than they shun the rest of IT, according to a survey. Of the 2,500 people who took cyber security training at QA in 2012, just 6.2 per cent were women. The number of women choosing to take up security courses also declined overall by 19.5 per cent between 2011 and 2012, while the …
Jasper Hamill, 06 Jun 2013

Black Hat 2015: 32 SCADA, mobile zero-day vulns will drop

Gird your loins, admins; researchers are set to drop 32 zero-day vulnerabilities at the Black Hat hacking fest in Las Vegas in August. The vulnerabilities have not been disclosed but they will affect mobile devices and Supervisory Control and Data Acquisition (SCADA) systems among other platforms. "We have 32 different zero- …
Darren Pauli, 21 Jul 2015

Promise of ‘higher profits’ sees US targeted by Android PIN-locking ransomware

Android PIN-locking ransomware, which – unbeknown to the user – changes a device's login code, is targeting mobile phone users in North America, leaving victims with a locked screen and a demand for $500. However, since the PIN is reset randomly even complying with these extortionate demands won’t do any good, as not even the …
John Leyden, 10 Sep 2015

India's tough hacker crackdown: IT security leaflets with every device

India has reportedly concocted a plan to cut down on IT security problems: forcing hardware vendors to include a security awareness brochure with all desktop PCs, mobile phones and USB modems. The plans were dreamt up to improve the country’s cyber security preparedness, in response to the increasing volume of online threats …
Phil Muncaster, 14 Jan 2013

Five million people exposed in Scottrade brokerage hack

If you've bought shares using retail broker Scottrade in the last few years, you may want to get in touch with the biz because its servers have been plundered by hackers unknown. The firm only found out about the data breach when the Feds got in contact to let it know. It now appears that 4.6 million customer accounts have …
Iain Thomson, 02 Oct 2015

MPs to assess tech feasibility of requirements under draft surveillance laws

IPB The UK government published a draft Investigatory Powers Bill earlier this month in a bid to close gaps it has said exist in the surveillance powers available to the UK's intelligence and security services. The Science and Technology Committee said that it will carry out a "short inquiry into the technology aspects" of the …
OUT-LAW.COM, 18 Nov 2015

The car in front has Kaspersky deep inside

Kaspersky Lab is taking anti-virus in a different direction by embedding it in SCADA-based industrial control systems, components of the Internet of Things, and yep, even cars. The Russian security software firm and SYSGO has teamed up to embed the new Kaspersky Security System platform within SYSGO's real-time operating system …
John Leyden, 02 Mar 2015
The Register breaking news

Bit9 hacked after it forgot to install ITS OWN security product

IT security biz Bit9's private digital certificates were copied by hackers and used to cryptographically sign malware to infect the company's customers. The software-whitelisting firm's certificates were swiped when its core systems were hacked last week. The intruders then signed malicious code and distributed it to the company …
John Leyden, 11 Feb 2013
US Pentagon. Pic: DoD photo by MSgt Ken Hammond, USAF

You're hosting Uncle Sam's files in the cloud. You get hacked. This is what happens next

The US government has posted a new set of rules outlining how cloud providers should report IT security cockups that involve Uncle Sam's data. The new Department of Defense (DoD) rules [PDF] include requirements on how contractors who handle government information should deal with computer network breaches and attacks, and how …
Shaun Nichols, 26 Aug 2015
hands waving dollar bills in the air

Reconceptualising IT security

Whitepaper Traditional approaches to information security are incapable of dealing with today's threats. Just as the attackers have evolved, so the security industry needs to adopt new architectural models and techniques to deliver appropriate protection without imposing unnecessary costs. In a nutshell this is the thesis of our latest …
Miatta Momoh, 14 Apr 2011
Shounting man in suit image via Shutterstock

All Cisco certs add cloud, IoT, 'business transformation'

Cisco has announced a major refresh of its certification programs, all of which will henceforth include material on cloud, the internet of things, cloud, “network programmability” and “business transformation”. Cloud and IoT are self-explanatory while “network programmability” is software-defined networking by another name. …
Simon Sharwood, 23 Nov 2015
sap security vulnerabilities

Almost EVERY SAP install hackable, researchers say

A staggering 95 percent of enterprise SAP installations contain high-severity vulnerabilities that could allow systems to be hijacked, researchers say. Researchers from SAP security tools vendor Onapsis say attackers can target the SAP installs to pivot from low to high integrity systems, execute admin privilege commands, and …
Darren Pauli, 08 May 2015

Experian-T-Mobile US hack: 'We trusted them, now that trust is broken'

Analysis The IT security breach that spilt the personal details of an estimated 15 million T-Mobile US phone contract applicants has thrown a new spotlight on the risks of breaches at third-party companies. T-Mobile's own systems weren't compromised. Rather, the source of the leak was Experian, the company that processed the carrier's …
John Leyden, 02 Oct 2015

Government Gateway online hack claims 'nonsense', say multiple folk in the know

Claims the Government Gateway online identity portal has been "hacked" have been dismissed as "nonsense" by the man originally responsible for the project and by two government information security experts. Earlier this week the Financial Times (behind paywall) reported that “tens of thousands” of Britons’ identities were …
Kat Hall, 29 Oct 2015
Rand Paul

CISA latest: Law urging tech giants to share your info with the Feds shows no sign of stopping

On Thursday morning the proposed Cybersecurity Information Sharing Act (CISA) moved a step closer to reality when the US Senate voted 83 to 14 to end debate on a package of amendments. The CISA legislation invites internet giants and other companies to quietly give people's private and personal information to the federal …
Iain Thomson, 22 Oct 2015