The company is the latest to be attacked after recent cyber attacks on Apple, Facebook and Twitter. Evernote's security team discovered suspicious activity in its network which attempted to access secure areas of its service. Evernote ...
Tags: cyber attack, Apple, Facebook, Twitter
Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, said security experts at the RSA Conference 2013 here this week. Over the past few years, the ...
Security company, FireEye, has announced a new threat protection platform designed to help enterprises deploy new security models to counter modern cyber attacks. Many traditional defences, such as firewalls and anti-virus, are not enough ...
The UK and India are expected to strike a deal to become trusted partners in the growing battle against cyber criminals and nation states, prime minister David Cameron has said. Reuters reports that the UK hopes that by setting up a joint ...
A report released National Audit Office revealed that the UK IT skills shortage means that Britain could have trouble defending itself from cyber attacks over the next 20 years. The UK was hit by over 40 million cyber attacks in 2011 ...
Tags: National Audit Office, UK, IT industry
A secret review of American policies governing the use of cyberweapons has concluded that President Barack Obama has the broad power to order pre-emptive strikes on any country preparing to launch a major digital attack against the U.S. ...
Tags: cyberweapons, broad power, digital attack
The UK Defence Committee is urging the Government to be more vigorous in its approach to cyber threats. A new report released by the Committee says that the British military is now too dependent on information and communications ...
Tags: military, IT, cyber threats, information, communications technology
A cybersecurity proposal released Wedneday by the influential Business Roundtable supports many of the provisions contained in the controversial Cyber Intelligence Sharing and Protection Act(CISPA)that was passed by the U.S.House of ...
Computerworld - John Brennan, who was nominated by President Barack Obama today to be the director of the Central Intelligence Agency, has been a vocal advocate for federal cybersecurity legislation in recent months. As the ...
Tags: cybersecurity legislation, Obama, cyberattacks, cybersec regulations
A new Flame and Stuxnet-related cyber-threat,dubbed Gauss,is targeting users in the Middle East,security researchers have revealed. Gauss is a complex,state-sponsored cyber-espionage toolkit with online banking Trojan functionality not ...
Yesterday, three people were arrested in Stoke-on-Trent following an investigation into ransomware by officers from the Police Central e-Crime Unit (PCeU). Ransomware commonly uses popup pages which contain blackmailing messages, telling ...
Tags: E-Crime, ransomware, ransomware attack, security tools
Enterprise IT security professionals faced increasingly sophisticated, stealthy and dynamic threats in 2012, but numerous surveys revealed that knowledge and understanding of the latest attack techniques are lacking in many organisations. ...
Tags: IT security, user security awareness, IT industry, cyber
The second quarter of 2012 saw the biggest increase in malware samples detected in the past four years, says security firm McAfee. Researchers detected a 1.5 million sample increase in malware since Q1 2012, according to the firm’s ...
Tags: McAfee, malware spike, Computer Products
Computerworld - A senior Democratic lawmaker is urging President Barack Obama to issue an executive order aimed at protecting the nation's critical infrastructure against cyber threats. In an open letter to the President on Tuesday, Sen. ...
Tags: infrastructure, US, cyber threats, computer network
Computer vulnerabilities and how they can affect Americans' security are on the agenda for the U.S. Senate, and strong rhetoric is being used to support new legislation. The Cybersecurity Act of 2012 is expected to move to the Senate ...
Tags: Rhetoric, Cybersecurity Bill, Washington, Computer Vulnerabilities