All the latest UK technology news, reviews and analysis


Security

V3's Dan Robinson

Why the Right to be Forgotten should not be dismissed

Those who argue that the right to be forgotten is unreasonable are missing the point

Security threats - password theft

Paddy Power admits to 2010 data breach

Alerts 650,000 punters to hacking incident

GCHQ Cheltenham

GCHQ approves six university cyber security Masters courses

Unviersity of Oxford and Lancaster University among those to meet stringent GCHQ teaching requirements

Tor hack casts doubt on safety and security of 'hidden' network

Law enforcement and research community will find ways get you, warn security experts

Hackers caught hunting Tor hidden services

Project says ‘it hopes' attacks were done by CERT researchers

Hacker crack squad hitting the video game industry with IP-stealing attacks

Wants to make games free for all, reports Dell SecureWorks

BlackBerry acquires Secusmart for anti-eavesdropping technology

BlackBerry moves to bolster its platform with technology used to secure German chancellor Angela Merkel's communications

Right to be Forgotten is unworkable and unreasonable, argue Lords

European Union's Court of Justice ruling must be overturned

Microsoft and Akamai launch cyber security startup college

Funding, mentoring and free tools all on offer

Hackers hit Israeli missile defence system

Security watcher says contractors have been ‘plundered’ for data

Koler Police ransomware infected 200,000 Android devices before takedown

Blackmail operation features PC-infection powers too, says Kaspersky Labs

ICO warns big data projects must abide by privacy laws

Innovation no excuse for ignoring legal requirements

Google has removed 45,000 Right to be Forgotten pages

This comes just after the Article 29 Working Party met to discuss how to manage Right to be Forgotten ruling

Seven arrests over $1.6m eBay StubHub cyber scam

Scam allegedly stole $1.6m from online ticketing service

Apple slams researcher over iOS backdoor claims

Firm releases details on ‘diagnostic tools’

DDoS attackers turn attention to SaaS and PaaS systems, Akamai reports

Cyber attacks target IT infrastructure with the potential to cripple datacentres

MPs move to cut DRIP data flows at the source

Programme is contrary to human rights legislation, say Tom Watson and David Davis

US warns of Huawei WiFi modem XSS security threat

Could be exploited for snooping, say researchers

Dell ignoring critical flaws in router and server-management systems

Flaw could give hackers free rein over system

Germans to avoid spying eyes with typewriters

Sneak welcomes return to the good old days

Popular Threads

Powered by Disqus
Xperia Z2 vs Galaxy Note 3 video review.jpg

Xperia Z2 vs Galaxy Note 3 video review

We pit Sony's 2014 flagship against Samsung's ruling phablet

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv3may

Getting started with virtualisation

Virtualisation can help you reduce costs, improve application availability, and simplify IT
management. However, getting started can be challenging

ibmv3may

Converting big data and analytics insights into results

Successful leaders are infusing analytics throughout their organisations to drive smarter decisions, enable faster actions and optimise outcomes

Redhat Linux Engineering - Financial Services

Skills:- - Redhat Linux - Engineering - Automation...

UX Designer - Nottingham

UX Designer - Nottingham - A talented Web Designer...

Windows Systems Administrator IIS - eCommerce

Windows Systems Administrator IIS Surrey / South West...

PHP Developer

PHP Developer - London, My client has an immediate need...