Current business security models fail to prepare for cyber threats in the face of highly sophisticated, powerful cyber attack tools that are no longer the preserve of nation states, as they filter down to a wider community of attackers. ...
Tags: security models, hackers, cyber attacks, Cyber criminals
SQL injection (SQLi) attacks rose 69% in the second quarter of 2012 compared with the previous quarter, according to the latest report from secure cloud hosting firm FireHost. FireHost said that, between April and June, it blocked nearly ...
Tags: SQL injection, SQLi attacks, FireHost, secure cloud hosting
There has been an unprecedented volume of malicious code and attacks - including many high profile incidents - in the Middle East during 2012. Attacks ranged from those performed by cyber criminals to hacktivists and in some cases ...
Tags: malicious code, malicious attacks, high profile incidents, IT Security
Microsoft will "draw a line in the sand" come April 2014 when Windows XP exits support, security researchers said today, even if millions of customers are still running the aged OS and a zero-day bug threatens the Windows ecosystem. Or ...
Tags: Microsoft, Windows XP, OS, Windows ecosystem
Public private partnerships are key to the UK’s cyber security strategy, says Cabinet Office minister for political and constitutional reform, Chloe Smith. “We are all in this together. The government recognizes that and ...
Tags: cyber security, constitutional reform, Govnet Cyber Security Summit 2012
With cybercrime revealed to cost Scottish businesses an estimated 5bn academics are urging firms to ensure IT staff have the right skills to overcome new and emerging threats. To enable them to do that, Edinburgh Napier University is ...
Tags: cybercrime, IT staf, IT industry, cyber security
Cybergeddon, a complete take-down of the internet, is undoubtedly within the power of some nation states, but is unlikely, say security industry experts. Bringing down the internet would not be in anyone’s interest, said Fred Piper, ...
Tags: Cybergeddon, internet, security industry, security consulting
Narayana Hrudayalaya finds a way to deliver better healthcare services and expand by hosting its hospital management system on the cloud. During the second week of July, 2003, a two-year-old Pakistani girl with a damaged heart crossed ...
Tags: Narayana Hrudayalaya, healthcare services, hospital management system
Security researchers have uncovered a highly sophisticated, multi-tiered, global financial fraud ring that has attempted fraudulent transfers of up to 1.6bn from at least 60 banks This fraud empire, discovered by researchers from security ...
Tags: financial fraud, security, banking system, financial security
The cost of protection against cyber crime can far exceed the cost of the threat itself, a Cambridge University-led international study has concluded. The first systematic study of the cost of cyber crime recommends that less should be ...
Tags: cyber crime, anti virus software, network, cyber safety
Cyber criminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. Three months ...
Tags: Black Market, malware, Proxy, Symantec, Computers
Details have emerged of an extraordinary attack in which millions of DSL broadband routers in Brazil were hit by a serious software flaw that allowed criminals to gain complete control of all web traffic running through them. First ...
Tags: Broadcom chipset, cyber attacks, DNS, malware, broadband routers
Cyber criminals are using compromised Twitter accounts to distribute messages disguised as coming from friends who suggest recipients click on a link to see themselves on a Facebook video. Sophos reported the trick after receiving a ...
Tags: Direct message virus, Facebook, LinkedIn, Malicious links, social media
With the advent of mobility and the influx of BYOD in enterprise, employers are struggling to keep control of their networks, according to John Yun, Director, Product Marketing, Blue Coat. Yun, who is in Dubai promoting Blue Coat’s ...
Tags: Blue Coat botnets, BYOD, cyber attacks, hackers
Different hacker groups claim to have breached servers belonging to ImageShack, Symantec, PayPal and other organisations. On Sunday, a hacker group called HTP claimed to have compromised Web servers, MySQL databases, routers and ...
Tags: cyber criminals, cyber security, cybercrime, hack, hackers, highlightedpost