Government

North Korea has only 28 registered domains, leak shows

By

Security engineer Matt Bryant posted details of North Korea's registered domains after a misconfigured nameserver revealed details.

Clapper: Russia has a long history of trying to interfere with elections

By

Director of national intelligence James Clapper said there have been previous instances of Russian attempts to influence US elections going back to the 1960s.

Will the Investigatory Powers Bill mean handing over the keys to the kingdom?

Will the Investigatory Powers Bill mean handing over the keys to the kingdom?

Nic Scott discusses how the IP Bill will fundamentally change the relationship between UK citizens and the government.

Hinkley Point C nuclear power station to go ahead with Chinese involvement despite previous concerns

Hinkley Point C nuclear power station to go ahead with Chinese involvement despite previous concerns

By

Despite concerns over security from both the Prime Minister and one of her chiefs of staff, Hinkley Point C nuclear power station has been given a green light today for construction with backing from China.

GCHQ planning use of DNS filters to curb cyber-attacks

GCHQ planning use of DNS filters to curb cyber-attacks

By

Boss of GCHQ and the new NCSC has revealed plans that the spy agencies are planning to partner with UK ISPs to use DNS filtering to curb cyber-attacks.

Guccifer 2.0 again denies Russian connection, mocks reports linking hacker to APT groups

Guccifer 2.0 again denies Russian connection, mocks reports linking hacker to APT groups

By

An individual who self-identified as Guccifer 2.0 continues to deny reports by security firms that link the purported hacker or hacking group to Russian advanced persistent threat (APT) groups.

Congressional report faults OPM over breach preparedness and response

Congressional report faults OPM over breach preparedness and response

By

The massive breach at the US Office of Personnel Management (OPM) might have been prevented had the agency followed basic cyber-security guidelines, a congressional investigation claimed.

Minimising the damage caused by a breach

Minimising the damage caused by a breach

Protecting data is a significant task faced by security managers every day. Paul German discusses creating cyber-security strategies for government agencies.

China allows foreign tech firms to participate in creating cyber-security standards

China allows foreign tech firms to participate in creating cyber-security standards

By

China has signaled an interest in a global approach to developing the country's cyber-security standards for foreign technology companies.

Russian government concern at rise in cyber-crime

Russian government concern at rise in cyber-crime

By

Russian Internet giant Mail.Ru Group said that customer details stolen from 25 million customer accounts no longer have any value: Russian government reconsiders how to tackle cyber-crime.

Cisco updates advisory: "We have started publishing fixes" for NSA-linked exploits

By

Cisco updated a security advisory for a remote code execution vulnerability affecting the SNMP application-layer protocol.

Bulgaria adopts cyber-resilience strategy

Bulgaria adopts cyber-resilience strategy

By

Bulgaria adopts a new national strategy to bolster its cyber-security efforts, reportedly one of the last countries in Europe to produce such a strategy.

After NSA leaks, a renewed interest in vulnerability disclosure

After NSA leaks, a renewed interest in vulnerability disclosure

By

Code leaked by the Shadow Brokers group has set off calls from security researchers and tech groups in the US for a national conversation about vulnerability disclosure policy.

Russia's Central Bank introduces new mandatory cyber-security regulations

Russia's Central Bank introduces new mandatory cyber-security regulations

By

Russian banks will be faced with a whole range of new regulations, and penalties for non-compliance, when it comes to cyber-security, according to the country's Central Bank

IP Bill gets approval from terror laws watchdog

IP Bill gets approval from terror laws watchdog

By

David Anderson QC, the UK anti-terror laws watchdog, has published a detailed report explaining why he is in favour of the Investigatory Powers Bill.

China launches first quantum satellite for "hack-proof" quantum comms

By

China launched an orbital carrier rocket early Tuesday morning carrying the 'Micius' satellite, believed to be the world's first quantum satellite.

Email accounts of Hillary Clinton and 100+ Democratic officials hacked

By

As the FBI investigation into the hack of the Democratic National Committee broadens, it is being reported that the private email accounts of Hillary Clinton and more than 100 Democratic officials also have been breached.

Israeli parliament recommends creation of national cyber-authority

Israeli parliament recommends creation of national cyber-authority

By

The Israeli Knesset waits on the passage of a bill which would see the amalgamation of Israel's cyber-defences into one central authority

Oz banks seek Apple tech for mobile transactions, Apple says no

By

A group of four banks in Australia want customers to be able to use the banks' own mobile apps when conducting financial transactions with Apple Pay.

Millions of Russians' personal data may be put at risk

Millions of Russians' personal data may be put at risk

By

A planned national database of personal data on Russian citizens could become a magnet for criminal cyber-attacks warn analysts.

Groups oppose EU funding of Romanian intelligence agency's facial recognition data program

By

European privacy groups have voiced opposition to a planned surveillance data project that would significantly expand the technology capabilities of Romania's domestic intelligence service.

DEF CON 24: US government retains dozens, not thousands, of zero-days

DEF CON 24: US government retains dozens, not thousands, of zero-days

By

The number of vulnerabilities in the US federal government arsenal hovers in the dozens, Columbia University senior research scholar Jason Healey told a DEF CON 24 audience.

Senators push for Oversight hearing into Trump's Russia comments

Senators push for Oversight hearing into Trump's Russia comments

By

US Senators asked Ted Cruz (R-TX) to hold a hearing that examines Donald Trump's Russia comments entreating Russia to "find the 30,000 emails that are missing."

Russians predict further attacks on Clinton's campaign HQ - immunity offered to hackers

Russians predict further attacks on Clinton's campaign HQ - immunity offered to hackers

By

Russian hacking groups believed responsible for the Clinton hacks may not be the Russian state, but it appears they are condoned and even encouraged by some security agencies.

UAE 'VPN ban' creates confusion

By

Increased fines for using VPN to commit criminal acts resulted in confusion over who can use VPN for what in the United Arab Emirates.

Arab-Americans join privacy groups in DNC anti-surveillance push

By

An Arab-American policy organisation has joined with civil liberties and privacy groups to address domestic surveillance policies that target Arab American and American Muslim communities.

Trump's Russian interests and Guccifer 2.0

Trump's Russian interests and Guccifer 2.0

By

A flood of information has emerged that connects GOP presidential nominee Donald Trump to a questionable cast of characters who are linked to Russian interests.

Foreign government requests for cyber-crime information up 44%

By

Cyber-crime requests triple in three years as international agencies seek greater cooperation to combat the threat.

Proliferation of hacker culture helped keep Anonymous from being branded terrorist org

By

How has Anonymous avoided being labeled as a terrorist group? That is a serious question that was proposed by an anthropologist during the HOPE Conference in New York City.

Google recieved record 4677 data requests in latest transparency report

By

Google's latest transparency report displays a continued increase in data requests the company received from government authorities.

SC Webcasts UK

Sign up to our newsletters

FOLLOW US