UK Security

The Securitisation of the Charity Sector

Dr Hany El-Banna OBE | Posted 21.07.2014 | UK
Dr Hany El-Banna OBE

When that space is claimed and tainted by perceived security interests and the engagement with certain actors has more to do with the fear of legal retribution back home than any tangible threat from individuals or groups, the sector has surrendered to the political and interests of our governments, not of universal humanitarian principles.

As the Islamic State's Threat Grows, Israel and Jordan Seek Security Ties

Nikita Malik | Posted 09.07.2014 | UK Universities & Education
Nikita Malik

In the long term, both Jordan and Israel will structure their partnership to be one that is devoid of any possible peril... Living apart together, Israel and Jordan are two partners that won't welcome the conflict coming closer to home.

Degrees of Separation: Jordan's Contiguous Border With Israel

Nikita Malik | Posted 18.06.2014 | UK Universities & Education
Nikita Malik

Palestinians who utilise the border crossings between Israel and Jordan are subject regularly to systematic discrimination. It is surprising, therefore, that Jordan continues to consent to Israel manning shared borders, particularly those of the Jordan Valley and the West Bank.

Guidance for The Naive Undergraduate - Part Five: Nightclub Security.

Thomas Hurdsfield | Posted 18.06.2014 | UK Universities & Education
Thomas Hurdsfield

Whenever I arrive at a bar or nightclub and I see security, I always feel like I have ran a mile in the rain with a rucksack full of books to make a train, only to be told that when I sit down breathless and drowning in my own sweat that there are leaves on the track. I think it can be established that there are three types of nightclub bouncers...

London Must Learn From Taipei Tube Attacks

David Spencer | Posted 10.06.2014 | UK Politics
David Spencer

At 4.26pm on Wednesday 21st May, a second year university student boarded a metro train at Longshan Temple station in Taipei, Taiwan. He was carrying two knives with him. In the four minutes before the train arrived at the next station, he killed four people and injured another twenty-three...

11 Pictures That Show Why Football Hooligans Would Be Wise To Avoid Brazil's Badass Security Forces

The Huffington Post UK | Posted 09.06.2014 | UK

Brazil has spent more than five times the amount on security as the last World Cup in South Africa. Those Robo-Cop outfits must have cost a lot. Th...

iPhone Ransom Hack 'Spreads To The UK'

The Huffington Post UK | Posted 28.05.2014 | UK Tech

An aggressive iPhone hack which demands ransoms from affected users appears to have spread to the UK. Users have taken to the official support foru...

Is the War of Cybercrime Really Lost?

Graham Welch | Posted 05.07.2014 | UK Tech
Graham Welch

Verizon said, having analysed 10 years' worth of data covering 100,000 security incidents, that 92 percent of attacks could be traced back to just nine threats - meaning firms have continued to fall for the same types of scams and attacks all this time repeatedly.

Designing Watch Dogs - An interview with Danny Belanger

Andrew Edney | Posted 23.06.2014 | UK Tech
Andrew Edney

With over than 10 years of experience in the game industry, he has worked on many successful franchises, including Army of Two, before joining Ubisoft's team in 2010. He's currently Lead Game Designer on Watch Dogs where his expertise is pushed to new heights.

Hacking Watch Dogs - An Interview With Thomas Geffroyd

Andrew Edney | Posted 23.06.2014 | UK Tech
Andrew Edney

All it takes is the swipe of a finger. We connect with friends. We buy the latest gadgets and gear. We find out what's happening in the world. But with that same simple swipe, we cast an increasingly expansive shadow.

The UK Launches Its Computer Emergency Response Team

Victoria Woodbine | Posted 17.06.2014 | UK Tech
Victoria Woodbine

The UK was delighted to host at the launch Larry Zelvin, the Director of the National Cybersecurity Communications Integration Centre (NCCIC). The NCCIC is CERT-UK's natural US counterpart based in the Department of Homeland Security. The UK welcomed Director Zelvin's US perspectives and the emphasis he firmly placed on the importance of close collaboration between the UK and US.

Revenge of the Gummi Finger - Pointing at the Wrong Target

Jon Geater | Posted 17.06.2014 | UK Tech
Jon Geater

I'll leave it to biometrics companies to defend fingerprints in general (there are arguments on grounds of reliability, cost etc that carry some weight) and save my own opinions on biometrics as credentials for another day.

First 'Heartbleed' Bug Arrest

Huffington Post UK | Posted 17.04.2014 | UK Tech

A Canadian teenager has become the first person arrested for attempting to exploit the Heartbleed bug. Heartbleed, discovered last week, is the nam...

Explainer: Should You Change Your Password After Heartbleed?

The Conversation UK | Posted 11.06.2014 | UK Tech
The Conversation UK

If you're struggling to understand the deluge of information about the Heartbleed vulnerability, you're not alone. Some reports tell us to change all our online passwords immediately, others warn us that this could do more harm than good. There is a lot of misinformation out there.

Security, Privacy and Freedom - Let's Tell the Enemy Everything

Dr. Peter Cochrane | Posted 08.06.2014 | UK Tech
Dr. Peter Cochrane

A steady stream of revelations by WikiLeaks and Edward Snowden seems to have sensitised the media, twitterati and conference goers globally to the 'the privacy issue'.

This Five-Year-Old Is Smarter Than Microsoft

PA/The Huffington Post UK | Posted 05.04.2014 | UK Tech

A five-year-old San Diego boy has outwitted the sharpest minds at Microsoft - he has found a backdoor to the Xbox. Kristoffer Von Hassel managed to...

A Taxi Driver's Guide to Peace in the Philippines

Phil Vernon | Posted 28.05.2014 | UK
Phil Vernon

Taking full advantage of the opportunity for peace in the Philippines will require a sustained effort on the part of central and local governments, by the rebel movements, as well as in civil society and the business community, over many years. Some of the factors they will need to take into account were identified at by our taxi driver last night.

EA Phishing Attack Dupes iTunes Users To Input Passwords

Huffington Post UK | Posted 20.03.2014 | UK Tech

An official EA Games server has been attacked by hackers -- and now hosts an incredibly realistic "phishing" site to try and collect user names and pa...

Thinking About Security: Security by Numbers

Jon Geater | Posted 04.05.2014 | UK Tech
Jon Geater

We all live multiple lives - as private individuals, national citizens, and corporate employees - and all those lives need to develop the same intuitive sense of security in the digital world as we already have in the physical world.

Energy Firm Cyber-defence Too Weak

Graham Welch | Posted 03.05.2014 | UK Tech
Graham Welch

Why are these critical infrastructure companies failing these tests? After all most of these large organizations are serious about cybersecurity. They run specialized departments tasked with protecting two key networks: data center (servers) and office automation (workstations).

Security for the Internet of Things

Graham Welch | Posted 26.04.2014 | UK Tech
Graham Welch

It is happening already and today you need to manage the whole attack continuum - before, during and after an attack. Only then can you hope to regain some of the initiative and ensure that damage to reputation and customer data is minimized, uncovered and remediated as quickly as possible.

The Destruction of Ivory Stocks Should Be Welcomed - But We Must Now Explain the Human Cost of this Vile Trade

Julius Maada Bio | Posted 13.04.2014 | UK Politics
Julius Maada Bio

This human cost should not be forgotten. Rather it should be central to any anti-poaching policy. If we do not change the conversation, this evil trade will only continue unabated. With any luck, an acknowledgement of the economic and security implications of this poaching crisis may help formulate a more nuanced response that will save Africa's great wildlife before it is too late.

Incident Response: Finding the Needle in the Haystack

Jaime Blasco | Posted 08.04.2014 | UK Tech
Jaime Blasco

Organisations are bombarded with potential threats every day. Most of these are small and irritating, not truly critical--but among those needles are little threads of larger actions at work. An incident response programme enables you to pull out the needles that make up the haystack of the big picture.

Social Media Jihadi: The Inside Story of a Briton Who Died Fighting for ISIS

Tam Hussein | Posted 07.04.2014 | UK Politics
Tam Hussein

Whilst debate rages on about the threat of foreign fighters returning home, there is one particular fighter who is being celebrated not only in his community but also on social media...

Afghanistan, K2K and I

Nancy Atkinson-Turner | Posted 06.04.2014 | UK
Nancy Atkinson-Turner

With an election fast approaching in Afghanistan the presence of the country in our news is stronger than ever. We see it on our TV's everyday and read about it in our newspapers.  But what do we actually know about the country? Behind the bombs?