All the latest UK technology news, reviews and analysis


Security

Android logo

Android fragmentation forced Google to cut WebView support for 930 million devices

WebView cut-off is sad but inevitable, says security community

Ghost figurines

Proof-of-concept WordPress Ghost attack appears

Researchers prove Linux flaw can easily be exploited

google logo search engine seo

Google will alter UK privacy policies but avoids fine from ICO

Data watchdog claims a win after securing commitments from search firm to change privacy terms

Hackers infiltrated financial services firm for six months with off-the-shelf malware

Breaking banks defences still isn't rocket science, says Darktrace

Government admits losing disks containing data on three police inquiries

Data relating to three highly sensitive public inquiries lost in the post

Bill Gates warns tech world to watch out for Terminators

Promises Cortana is on our side, though

Google's Project Zero doing more harm than good, argue security experts

Foolhardy vulnerability disclosure is helping hackers

Bit9 moves to spot lurking threats with Carbon Black 5.0

Upgrade adds continuous recording powers

IBM details Identity Mixer for preserving user authentication privacy

Technology allows people to verify key details about themselves without giving away too much information

EU wants single data protection law in place by end of 2015

Joint statement issued on European Data Protection Day

Lords remove 'Snoopers' Charter' amendments but concerns remain

Withdrawal of amendment does not spell the end for controversial monitoring plans

Facebook blames internal error for outage and dismisses Lizard Squad claims

Firm insists in-house system change caused site to go offline briefly

Hoax caller chats with David Cameron by posing as GCHQ boss

No national security information revealed. Phew

Adobe rushes fix for second Flash Player zero-day

Hackers could hijack control of vulnerable systems

Patching old Android browsers is too much effort, says Google

Firm offers guidance to vulnerable users left in the lurch

Kjw0rm and Sir DoOoM malware found on hacker forum

Developed attack tools have advanced functionality

Apple Mac OS X security flaws revealed by Google

Bug research team take aim at Apple after Microsoft scuffle

Kids create cyber security education tool to tackle hacking

School children as young as nine now becoming aware of cyber attacks

V3 will host Enterprise Mobility Summit

Mark your diaries for 24 - 26 February

Biometrics will spell the end for passwords by 2020

Research by Visa Europe highlights a bright future for biometrics

Chinese hackers hitting Microsoft Outlook users with man-in-the-middle attacks

Security experts warn business travellers to keep their guard up if working in China

US and UK cyber war games will not stop the hacker army

Sony breach proves the need for stronger defence tests, argues security community

Previous 1 3 4 5 6 7 Next

Popular Threads

Powered by Disqus
LG G Flex 2 hands-on review

CES 2015: LG G Flex 2 video

A closer look at LG's latest curved-screen smartphone

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
mubaloo2

Beacon technology: what are the opportunities and how does the technology work?

This paper seeks to provide education and technical insight to beacons, in addition to providing insight to Apple's iBeacon specification

ibmv3may

Converting big data and analytics insights into results

Successful leaders are infusing analytics throughout their organisations to drive smarter decisions, enable faster actions and optimise outcomes

C++ 11 Developer - Finance - C++/STL

Skills: C++. Linux, Solaris, SQL, Multi-thread, GUI...

CRM System Officers

At the University of Derby, people are at the heart of...

Business Intelligence Analyst

Citywire is a global publishing company with offices...

CRM System Support & Development Manager

At the University of Derby, people are at the heart of...