Richard Thurston

Recent articles by Richard Thurston

Steganography developers turn their attention to hiding information in VoIP

Steganography developers turn their attention to hiding information in VoIP

Polish researchers have developed a range of steganographic techniques which would enable a hacker to hide information in VoIP traffic.
Richard Thurston Jul 7 2008 3:42PM Security
 HMRC breach would have been avoided for just A$30,000

HMRC breach would have been avoided for just A$30,000

The massive data breach at UK's HMRC, in which the records of 25 million people were lost, could have been avoided for £15,000 (A$30,000).
Richard Thurston Jul 4 2008 10:49AM Security
FBI access to private data in Europe pending

FBI access to private data in Europe pending

The European Commission is said to be close to finalizing an agreement with the United States that would allow the FBI to see the credit card histories and internet browsing habits of European citizens.
Richard Thurston Jul 1 2008 9:56AM Security
Microsoft joins Cisco and IBM in security initiative

Microsoft joins Cisco and IBM in security initiative

Microsoft is spearheading its second global security initiative in a week by setting up a scheme to try to tackle multi-vendor security threats.
Richard Thurston Jul 1 2008 9:56AM Security
Poynter review: HMRC has radically reduced security risks

Poynter review: HMRC has radically reduced security risks

HMRC has radically improved its data security measures since the breach which caused it to lose 25 million child benefit records in October last year.
Richard Thurston Jun 27 2008 10:25AM Security
Oyster card hackers may have their research blocked

Oyster card hackers may have their research blocked

HMRC has radically improved its data security measures since the breach which caused it to lose 25 million child benefit records in October last year.
Richard Thurston Jun 27 2008 10:25AM Security
Google, Microsoft lead efforts to spur digital identities

Google, Microsoft lead efforts to spur digital identities

Google and Microsoft are among an extensive set of technology vendors aiming to spur the adoption of digital identity cards.
Richard Thurston Jun 25 2008 9:51AM Security
Euro 2008's 'Malicious XI' revealed

Euro 2008's 'Malicious XI' revealed

McAfee has produced a list of those players whose names are most likely to give fans a malware headache.
Richard Thurston Jun 24 2008 8:50AM Security
Coffee drinkers in peril after espresso overspill attack

Coffee drinkers in peril after espresso overspill attack

A geeky risk advisory manager from global accountancy firm BDO has hacked into a leading coffee machine, causing it to pour scalding water onto unsuspecting espresso lovers
Richard Thurston Jun 20 2008 10:56AM Security
Trend Micro takes security into the cloud

Trend Micro takes security into the cloud

The software vendor has unveiled its new approach to internet security, which means transferring the workload off individual PCs and into the internet.
Richard Thurston Jun 20 2008 10:56AM Security
BlackBerry service won't be shut down despite ultimatum

BlackBerry service won't be shut down despite ultimatum

The BlackBerry service will not be shut down in India, despite threats from the country's Government, according to BlackBerry manufacturer RIM.
Richard Thurston Jun 19 2008 10:08AM Security
Symantec pledges support to VB100 tests

Symantec pledges support to VB100 tests

The security vendor says it's "absolutely" committed to the VB100 anti-malware tests, following Trend Micro's announcement of a boycott earlier this month
Richard Thurston Jun 17 2008 9:59AM Security
Minister faces grilling after second secret document leak

Minister faces grilling after second secret document leak

Has the UK's fight against terrorism been compromised after a second set of confidential Government documents was left on a train?
Richard Thurston Jun 17 2008 9:59AM Security
NASA hacker to appeal

NASA hacker to appeal

Gary McKinnon, the Briton who is facing extradition to the US for hacking into NASA's computers, is to appeal the deportation on Monday.
Richard Thurston Jun 16 2008 10:20AM Security
UK Ministry of Defence to bolster internet intelligence

UK Ministry of Defence to bolster internet intelligence

The MoD is increasing its focus on online intelligence gathering - partly by using information from newspapers and blogs.
Richard Thurston Jun 16 2008 10:20AM Security
UK Government suspends official over al-Qaeda document leak

UK Government suspends official over al-Qaeda document leak

The Government has suspended a civil servant who left top secret documents regarding al-Qaeda on a train on Tuesday.
Richard Thurston Jun 13 2008 10:05AM Security
Securing businesses is "extremely challenging", claim UK bosses

Securing businesses is "extremely challenging", claim UK bosses

British businesses are finding that protecting their organisations from hackers, social networking threats and browser vulnerabilities is an increasing struggle, according to research
Richard Thurston Jun 11 2008 11:00AM Security
Security expert: BT should be prosecuted over its use of Phorm

Security expert: BT should be prosecuted over its use of Phorm

Cambridge University security researcher Dr Richard Clayton argues that BT should be prosecuted because it monitored internet users' websurfing habits without their permission, while the telco declines to say its activities were legal.
Richard Thurston Jun 10 2008 10:12AM Security
Second tier vendors to challenge McAfee, Symantec on endpoint security

Second tier vendors to challenge McAfee, Symantec on endpoint security

AVG, BitDefender, Kaspersky and Sophos are making inroads into the market share of the endpoint industry leaders, largely on the grounds of using less processing power, a leading analyst argued today
Richard Thurston Jun 6 2008 10:22AM Security
Trend Micro to boycott security tests

Trend Micro to boycott security tests

The security vendor's chief technology officer said today the company will withdraw from the popular VB100 anti-malware tests, launching a tirade against the testers' methodology.
Richard Thurston Jun 6 2008 10:13AM Security

Log In

  |  Forgot your password?