UK Security

Designing Watch Dogs - An interview with Danny Belanger

Andrew Edney | Posted 24.04.2014 | UK Tech
Andrew Edney

With over than 10 years of experience in the game industry, he has worked on many successful franchises, including Army of Two, before joining Ubisoft's team in 2010. He's currently Lead Game Designer on Watch Dogs where his expertise is pushed to new heights.

Hacking Watch Dogs - An Interview With Thomas Geffroyd

Andrew Edney | Posted 24.04.2014 | UK Tech
Andrew Edney

All it takes is the swipe of a finger. We connect with friends. We buy the latest gadgets and gear. We find out what's happening in the world. But with that same simple swipe, we cast an increasingly expansive shadow.

The UK Launches Its Computer Emergency Response Team

Victoria Woodbine | Posted 22.04.2014 | UK Tech
Victoria Woodbine

The UK was delighted to host at the launch Larry Zelvin, the Director of the National Cybersecurity Communications Integration Centre (NCCIC). The NCCIC is CERT-UK's natural US counterpart based in the Department of Homeland Security. The UK welcomed Director Zelvin's US perspectives and the emphasis he firmly placed on the importance of close collaboration between the UK and US.

Revenge of the Gummi Finger - Pointing at the Wrong Target

Jon Geater | Posted 22.04.2014 | UK Tech
Jon Geater

I'll leave it to biometrics companies to defend fingerprints in general (there are arguments on grounds of reliability, cost etc that carry some weight) and save my own opinions on biometrics as credentials for another day.

First 'Heartbleed' Bug Arrest

Huffington Post UK | Posted 17.04.2014 | UK Tech

A Canadian teenager has become the first person arrested for attempting to exploit the Heartbleed bug. Heartbleed, discovered last week, is the nam...

Explainer: Should You Change Your Password After Heartbleed?

The Conversation UK | Posted 11.04.2014 | UK Tech
The Conversation UK

If you're struggling to understand the deluge of information about the Heartbleed vulnerability, you're not alone. Some reports tell us to change all our online passwords immediately, others warn us that this could do more harm than good. There is a lot of misinformation out there.

Security, Privacy and Freedom - Let's Tell the Enemy Everything

Dr. Peter Cochrane | Posted 09.04.2014 | UK Tech
Dr. Peter Cochrane

A steady stream of revelations by WikiLeaks and Edward Snowden seems to have sensitised the media, twitterati and conference goers globally to the 'the privacy issue'.

This Five-Year-Old Is Smarter Than Microsoft

PA/The Huffington Post UK | Posted 05.04.2014 | UK Tech

A five-year-old San Diego boy has outwitted the sharpest minds at Microsoft - he has found a backdoor to the Xbox. Kristoffer Von Hassel managed to...

A Taxi Driver's Guide to Peace in the Philippines

Phil Vernon | Posted 31.03.2014 | UK
Phil Vernon

Taking full advantage of the opportunity for peace in the Philippines will require a sustained effort on the part of central and local governments, by the rebel movements, as well as in civil society and the business community, over many years. Some of the factors they will need to take into account were identified at by our taxi driver last night.

EA Phishing Attack Dupes iTunes Users To Input Passwords

Huffington Post UK | Posted 20.03.2014 | UK Tech

An official EA Games server has been attacked by hackers -- and now hosts an incredibly realistic "phishing" site to try and collect user names and pa...

Thinking About Security: Security by Numbers

Jon Geater | Posted 04.03.2014 | UK Tech
Jon Geater

We all live multiple lives - as private individuals, national citizens, and corporate employees - and all those lives need to develop the same intuitive sense of security in the digital world as we already have in the physical world.

Energy Firm Cyber-defence Too Weak

Graham Welch | Posted 04.03.2014 | UK Tech
Graham Welch

Why are these critical infrastructure companies failing these tests? After all most of these large organizations are serious about cybersecurity. They run specialized departments tasked with protecting two key networks: data center (servers) and office automation (workstations).

Security for the Internet of Things

Graham Welch | Posted 25.02.2014 | UK Tech
Graham Welch

It is happening already and today you need to manage the whole attack continuum - before, during and after an attack. Only then can you hope to regain some of the initiative and ensure that damage to reputation and customer data is minimized, uncovered and remediated as quickly as possible.

The Destruction of Ivory Stocks Should Be Welcomed - But We Must Now Explain the Human Cost of this Vile Trade

Julius Maada Bio | Posted 13.04.2014 | UK Politics
Julius Maada Bio

This human cost should not be forgotten. Rather it should be central to any anti-poaching policy. If we do not change the conversation, this evil trade will only continue unabated. With any luck, an acknowledgement of the economic and security implications of this poaching crisis may help formulate a more nuanced response that will save Africa's great wildlife before it is too late.

Incident Response: Finding the Needle in the Haystack

Jaime Blasco | Posted 08.04.2014 | UK Tech
Jaime Blasco

Organisations are bombarded with potential threats every day. Most of these are small and irritating, not truly critical--but among those needles are little threads of larger actions at work. An incident response programme enables you to pull out the needles that make up the haystack of the big picture.

Social Media Jihadi: The Inside Story of a Briton Who Died Fighting for ISIS

Tam Hussein | Posted 07.04.2014 | UK Politics
Tam Hussein

Whilst debate rages on about the threat of foreign fighters returning home, there is one particular fighter who is being celebrated not only in his community but also on social media...

Afghanistan, K2K and I

Nancy Atkinson-Turner | Posted 06.04.2014 | UK
Nancy Atkinson-Turner

With an election fast approaching in Afghanistan the presence of the country in our news is stronger than ever. We see it on our TV's everyday and read about it in our newspapers.  But what do we actually know about the country? Behind the bombs?

Are You 'Cyberstreetwise'?

David Emm | Posted 05.04.2014 | UK Tech
David Emm

It is important to alert people to the dangers online using all available media platforms, in the hope that they apply the same level of common sense to their online activity that they do in the real world.

12 Things Every SMB Should Know About Security

Allen Scott | Posted 31.03.2014 | UK Tech
Allen Scott

Small and medium businesses are the backbone of the economy, employing more than half of all private sector workers and contributing 50 per cent of UK GDP. Now, imagine you are a cyber criminal and you are picking your next targets.

What Is the Hardest Conversation You Have Had to Say?

Graham Welch | Posted 26.03.2014 | UK Tech
Graham Welch

No one likes to have to have a difficult conversation with a friend, family member or colleague. In the context of the home, there is nothing worse than having to tell your son or daughter their cherished hamster has died for example.

Bombs, Bullets and Burkas? It's the Bravery and Boldness of Afghan Women We Must Support

Karla McLaren | Posted 17.03.2014 | UK
Karla McLaren

What fragile progress on women's rights there has been in recent years is down to the work of Afghan women activists, and it will be down to them to ensure that progress is protected and bettered in the months and years ahead. But their ability to do so will be seriously undermined if their security cannot be assured.

iPhones Change the Business Landscape

Graham Welch | Posted 15.03.2014 | UK Tech
Graham Welch

Seven years ago last week Steve Jobs stood up at Macworld, San Francisco, and announced the first iPhone in San Francisco and in doing so launched a revolution that is still having a monumental impact on the business and social world today.

'Tis the Season for Predictions...

Graham Welch | Posted 11.02.2014 | UK Tech
Graham Welch

Cybercrime today is not like the early days of virus writers and hackers who bragged about their exploits with friends. Today cybercrime is a serious business where actually most hackers do not want to be noticed as the longer they remain hidden in the network and are free to conduct their operations, the more information they can steal and the more money they can make.

The Guantanamo Bay Detainees Reluctant to Go Home

Robin Simcox | Posted 05.02.2014 | UK Politics
Robin Simcox

Balancing national security concerns with human rights obligations is a perennial problem for Western governments. Nowhere has this liberty/security balance proven more controversial than Guantanamo Bay, where a recent incident particularly highlighted this dilemma.

Where Is Your Stuff?

Allen Scott | Posted 02.02.2014 | UK Tech
Allen Scott

You probably have a sock drawer littered with lonesome socks for which you could swear there used to be a partner. The Internet has become the sock drawer of digital content. The problem with the Internet is that someone else might be wearing the other sock!