Thomas Brewster

Author: Thomas Brewster

Security Correspondent, TechWeekEurope
Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.
Thomas Brewster Thomas Brewster Thomas Brewster
Thomas Brewster's posts
SQL username password - Shutterstock: © hauhu
On by Thomas Brewster 0

British company road testing a dongle designed to make password leaks an non-problem, but not all are convinced by it

Read more

Alex Stamos
On by Thomas Brewster 0

Yahoo beefs up its security team with a new leader - Alex Stamos, one of the NSA's more vocal critics

Read more

Ukraine - Shutterstock - © Mykhaylo Palinchak
On by Thomas Brewster 1

Expert suggests Ukraine would not be able to withstand a coordinated Russian attack on its infrastructure

Read more

Bitcoin (c) Tomas Daliman, Shutterstock 2014
On by Thomas Brewster 0

Hackers target CEO Mark Karpeles to show outrage at Bitcoin exchange

Read more

Barrett Brown - Wikimedia Commons
On by Thomas Brewster 0

Brown is still accused of holding credit card data but charges of linking to the data have been dismissed

Read more

gun disarm neutralise © Micha Klootwijk Shutterstock
On by Thomas Brewster 0

Facebook to warn any gun dealers using illicit sales tactics

Read more

Bitcoin Green virtual money © Niyazz Shutterstock
On by Thomas Brewster 0

Flexcoin caves after epic theft, whilst exchange Poloniex loses 12 percent of its coins and First Meta CEO is found dead

Read more

NSA backdoor broken packlock encryption security © keantian Shutterstock
On by Thomas Brewster 0

TLS/SSL encryption standards have a flaw which allows man-in-the-middle attacks, while the GnuTLS implementation has a long-running weakness

Read more

NHS - Shutterstock: © RTimages
On by Thomas Brewster 0

NHS data sharing initiatives cause upset again after two third parties take down files that indicate they shared public data in places they shouldn't have

Read more

router internet DSL SOHO gateway broadband © Ensuper Shutterstock
On by Thomas Brewster 1

Epic attack allows hackers to send victims to any IP address they choose

Read more