With cybercrime revealed to cost Scottish businesses an estimated 5bn academics are urging firms to ensure IT staff have the right skills to overcome new and emerging threats. To enable them to do that, Edinburgh Napier University is ...
Tags: cybercrime, IT staf, IT industry, cyber security
The Iranian government appears to have blocked access to Google's search engine and Gmail webmail service from inside Iran, according to Internet users there. A security researcher going by the Twitter handle of @0xal reported late Sunday ...
Tags: Iran, Blocks Access, Gmail, Google
Germany's cybersecurity agency on Monday urged users to drop Internet Explorer (IE) and switch to a rival, like Chrome or Firefox, until Microsoft patches a new critical bug in its browser. In an alert released Monday, Germany's Federal ...
Tags: Germany, cybersecurity agency, IE, users
Cybercriminals no longer control one of the world's largest spam botnets, Grum, because all of the servers the botnet relied on for receiving commands were shut down, according to researchers from security firm FireEye. The last Grum ...
Tags: Cybercriminals, spam botnets, Grum, servers
A novel technique based on MapReduce could let hackers hijack computing resources used by cloud-based mobile browsers and use them anonymously, according to security researchers from North Carolina State University and the University of ...
Tags: cloud computing, Mobile browser hack, mobile device threat, smartphone
The Iranian government appears to have blocked access to Google’s search engine and Gmail webmail service from inside Iran, according to Internet users there. A security researcher going by the Twitter handle of @0xal reported that ...
Tags: Blocked, cyber attack, Gmail, Google, Security
The three finalists of Microsoft's inaugural BlueHat competition, to develop innovative computer security protection technologies, have been announced. The competition, which ran from 3 August 2011 to 1 April 2012, is aimed at stimulating ...
Tags: Microsoft, innovative computer, security protection technologies
Software made by Siemens and targeted by the Stuxnet malware is still full of other dangerous vulnerabilities,according to Russian researchers whose presentation at the Defcon security conference earlier this year was cancelled following a ...
Tags: Siemens software, Stuxnet, Sergey Gordeychik, SCADA system
It's not exactly the type of advertisement most people would understand. For sale:"Our first 0day for Win8+IE10 with HiASLR/AntiROP/DEP&Prot Mode sandbox bypass(Flash not needed)."It's part of a recent message on Twitter from Vupen,a ...
Tags: Windows 8, Zero-Day Vulnerability, Vupen, computer security research
IDG News Service-In one of the photos,the dark-haired,bearded hacker is peering into his computer's screen,perhaps puzzled at what's happening.Minutes later,he cuts his computer's connection,realizing he has been discovered. The nation of ...
Tags: Georgia, cyber-spying, Russia-Based Hacker
Chip manufacturer Intel is to let go of a "small percentage" of the workforce at its McAfee computer security business. Intel completed its acquisition of McAfee in February 2011 for $7.7bn (£4.8bn). At the time, Renée James, ...
Tags: Intel, Mcafee, Atom Z2760, chip manufacturer
Two security researchers claim to have developed a new attack that can decrypt session cookies from HTTPS (Hypertext Transfer Protocol Secure) connections. Websites use session cookies to remember authenticated users. If an attacker gains ...
Tags: Data Center, HTTPS, computer security, security research
More than two-fifths of companies worldwide have failed to prepare for cyber threats, a survey from security company Kaspersky Lab has revealed. Some 41% of more than 3,300 IT professionals polled in 22 countries – including 200 in ...
Tags: cyber threats, Kaspersky, online attacks
Cybersecurity researchers have uncovered a new threat targeting infrastructure in the energy sector that is believed to have hit at least one organisation. The malware, dubbed Shamoon, corrupts files on a compromised computer and ...
Tags: threat targeting infrastructure, computer security, computer attack
Infoworld - When it comes to IT security, FUD (fear, uncertainty, and doubt) is more than just the tool of overhyping vendors hoping to sell their next big thing. It is the reality that seasoned IT security pros live in, thanks in large ...
Tags: IT security, FUD, Paul Ferguson, antivirus scanner