UK Security

Apple Just Did Something Amazing

Jon Geater | Posted 19.09.2014 | UK Tech
Jon Geater

Apple Pay, the contactless and in-app purchasing system announced by Apple this week... is not that amazing something.

Apple Won't Unlock iOS 8 Phones For The Police. Ever.

The Huffington Post UK | Michael Rundle | Posted 18.09.2014 | UK Tech

The iPhone 6 comes with one feature that went largely ignored at the unveiling last week: privacy. Apple has confirmed that a change at the core of...

And The 'Suspicious Item' Behind The Luton Airport Bomb Scare Was...

The Huffington Post UK | Louise Ridley | Posted 11.09.2014 | UK

Around 2,000 people were evacuated from Luton Airport on Monday due to a security threat that turned out to be triggered by... a pair of hair straight...

Bomb Disposal Squad At Luton Airport, Thousands Evacuated

The Huffington Post UK | Louise Ridley | Posted 11.09.2014 | UK

Luton Airport has been evacuated after a "suspicious item" was found in the terminal building at around 2pm Monday. All incoming flights suspended...

What Can We Learn From This Week's iCloud Incident?

Gary Newe | Posted 04.09.2014 | UK Tech
Gary Newe

This week has been a wakeup call to many individuals that hackers target individuals and businesses alike. What we must learn from it is that we are all responsible for our own data and we must all do what we can to secure it.

Russian Group Hacking: What We Know and What We Can Learn

Gary Newe | Posted 07.08.2014 | UK Tech
Gary Newe

A Russian group has hacked 1.2 billion usernames and passwords belonging to more than 500 million email addresses... Nowadays hackers actually get more value out of personal information as opposed to credit card details. In fact, one article even points out that Twitter account information is of more worth to a hacker than their credit card.

The Non-Specific Details of the Norwegian Threat

Bjørn Ihler | Posted 25.09.2014 | UK Politics
Bjørn Ihler

The Norwegian Police Security Service have announced that they had received credible threats of terrorism against Norway within the next few days. The Security Service were very non-specific when sharing this information with the general public...

The Securitisation of the Charity Sector

Dr Hany El-Banna OBE | Posted 20.09.2014 | UK
Dr Hany El-Banna OBE

When that space is claimed and tainted by perceived security interests and the engagement with certain actors has more to do with the fear of legal retribution back home than any tangible threat from individuals or groups, the sector has surrendered to the political and interests of our governments, not of universal humanitarian principles.

As the Islamic State's Threat Grows, Israel and Jordan Seek Security Ties

Nikita Malik | Posted 06.09.2014 | UK Universities & Education
Nikita Malik

In the long term, both Jordan and Israel will structure their partnership to be one that is devoid of any possible peril... Living apart together, Israel and Jordan are two partners that won't welcome the conflict coming closer to home.

Degrees of Separation: Jordan's Contiguous Border With Israel

Nikita Malik | Posted 13.08.2014 | UK Universities & Education
Nikita Malik

Palestinians who utilise the border crossings between Israel and Jordan are subject regularly to systematic discrimination. It is surprising, therefore, that Jordan continues to consent to Israel manning shared borders, particularly those of the Jordan Valley and the West Bank.

Guidance for The Naive Undergraduate - Part Five: Nightclub Security.

Thomas Hurdsfield | Posted 11.08.2014 | UK Universities & Education
Thomas Hurdsfield

Whenever I arrive at a bar or nightclub and I see security, I always feel like I have ran a mile in the rain with a rucksack full of books to make a train, only to be told that when I sit down breathless and drowning in my own sweat that there are leaves on the track. I think it can be established that there are three types of nightclub bouncers...

London Must Learn From Taipei Tube Attacks

David Spencer | Posted 09.08.2014 | UK Politics
David Spencer

At 4.26pm on Wednesday 21st May, a second year university student boarded a metro train at Longshan Temple station in Taipei, Taiwan. He was carrying two knives with him. In the four minutes before the train arrived at the next station, he killed four people and injured another twenty-three...

11 Pictures That Show Why Football Hooligans Would Be Wise To Avoid Brazil's Badass Security Forces

The Huffington Post UK | Posted 09.06.2014 | UK

Brazil has spent more than five times the amount on security as the last World Cup in South Africa. Those Robo-Cop outfits must have cost a lot. Th...

iPhone Ransom Hack 'Spreads To The UK'

The Huffington Post UK | Posted 28.05.2014 | UK Tech

An aggressive iPhone hack which demands ransoms from affected users appears to have spread to the UK. Users have taken to the official support foru...

Is the War of Cybercrime Really Lost?

Graham Welch | Posted 05.07.2014 | UK Tech
Graham Welch

Verizon said, having analysed 10 years' worth of data covering 100,000 security incidents, that 92 percent of attacks could be traced back to just nine threats - meaning firms have continued to fall for the same types of scams and attacks all this time repeatedly.

Designing Watch Dogs - An interview with Danny Belanger

Andrew Edney | Posted 23.06.2014 | UK Tech
Andrew Edney

With over than 10 years of experience in the game industry, he has worked on many successful franchises, including Army of Two, before joining Ubisoft's team in 2010. He's currently Lead Game Designer on Watch Dogs where his expertise is pushed to new heights.

Hacking Watch Dogs - An Interview With Thomas Geffroyd

Andrew Edney | Posted 23.06.2014 | UK Tech
Andrew Edney

All it takes is the swipe of a finger. We connect with friends. We buy the latest gadgets and gear. We find out what's happening in the world. But with that same simple swipe, we cast an increasingly expansive shadow.

The UK Launches Its Computer Emergency Response Team

Victoria Woodbine | Posted 17.06.2014 | UK Tech
Victoria Woodbine

The UK was delighted to host at the launch Larry Zelvin, the Director of the National Cybersecurity Communications Integration Centre (NCCIC). The NCCIC is CERT-UK's natural US counterpart based in the Department of Homeland Security. The UK welcomed Director Zelvin's US perspectives and the emphasis he firmly placed on the importance of close collaboration between the UK and US.

Revenge of the Gummi Finger - Pointing at the Wrong Target

Jon Geater | Posted 17.06.2014 | UK Tech
Jon Geater

I'll leave it to biometrics companies to defend fingerprints in general (there are arguments on grounds of reliability, cost etc that carry some weight) and save my own opinions on biometrics as credentials for another day.

First 'Heartbleed' Bug Arrest

Huffington Post UK | Posted 17.04.2014 | UK Tech

A Canadian teenager has become the first person arrested for attempting to exploit the Heartbleed bug. Heartbleed, discovered last week, is the nam...

Explainer: Should You Change Your Password After Heartbleed?

The Conversation UK | Posted 11.06.2014 | UK Tech
The Conversation UK

If you're struggling to understand the deluge of information about the Heartbleed vulnerability, you're not alone. Some reports tell us to change all our online passwords immediately, others warn us that this could do more harm than good. There is a lot of misinformation out there.

Security, Privacy and Freedom - Let's Tell the Enemy Everything

Dr. Peter Cochrane | Posted 08.06.2014 | UK Tech
Dr. Peter Cochrane

A steady stream of revelations by WikiLeaks and Edward Snowden seems to have sensitised the media, twitterati and conference goers globally to the 'the privacy issue'.

This Five-Year-Old Is Smarter Than Microsoft

PA/The Huffington Post UK | Posted 05.04.2014 | UK Tech

A five-year-old San Diego boy has outwitted the sharpest minds at Microsoft - he has found a backdoor to the Xbox. Kristoffer Von Hassel managed to...

A Taxi Driver's Guide to Peace in the Philippines

Phil Vernon | Posted 28.05.2014 | UK
Phil Vernon

Taking full advantage of the opportunity for peace in the Philippines will require a sustained effort on the part of central and local governments, by the rebel movements, as well as in civil society and the business community, over many years. Some of the factors they will need to take into account were identified at by our taxi driver last night.

EA Phishing Attack Dupes iTunes Users To Input Passwords

Huffington Post UK | Posted 20.03.2014 | UK Tech

An official EA Games server has been attacked by hackers -- and now hosts an incredibly realistic "phishing" site to try and collect user names and pa...