A suspected Iran-based hacking group known for defacing websites has shown increased ambition over the past few months, targeting U.S. defence contractors and Iranian dissidents, according to a new report from security company FireEye. ...
Tags: Computer Products, IT
Designs for more than two dozen advanced U.S. weapon systems, including missile defenses, combat aircraft and ships, were reportedly accessed by Chinese hackers. The systems were listed in a previously undisclosed section of a report ...
Tags: US, Chinese Hackers, Weapons System
A Pentagon report has accused the Chinese government of cyber attacks against military and civilian computer systems in the US. It marks the first time US authorities have directly suggested that Beijing is behind computer hacking, with ...
Tags: Pentagon, Computer Systems
The recent attack on computer networks at broadcasting organisations and banks in South Korea has brought cyber war into the limelight. While the cause of the attacks remains unknown, South Korean authorities say they "do not rule out the ...
Tags: Computer Products, Networks
The U.S. is dangerously unprepared to face a full-scale cyberconflict launched by a peer adversary, a report by the military's Defense Science Board (DSB) warns. The report, released in January, and first reported on by The Washington ...
Iran's growing cyber capabilities are a "force to be reckoned with", a senior United States Air Force officer has warned. General William Shelton, commander of the US Air Force Space Command, made the comment to reporters at a Defense ...
The UK is to offer around 100 18-year-olds training in advanced IT skills to bolster the expertise of intelligence agencies in fighting cyber crime. The scheme was announced by foreign secretary William Hague during a visit to Bletchley ...
Tags: UK, GCHQ, cyber crime, training, advanced IT skills, 18-year-olds
An increase in hacktivism and a greater prevalence of Advanced Evasion Techniques will form part of the backdrop of IT security in 2013, according to Stonesoft With 2013 just around the corner, it is time for IT security experts to reflect ...
Tags: Stonesoft, cyber threats, Evasion Techniques, IT security
Future warfare could be fought by soldiers using bullets and bombs as well as people hunched over laptops according to experts in cyber conflict. The analysis comes in response to a recent article, titled “U.S. Admits to Cyber ...
Tags: cyber war, cybercrime, Future warfare
The UK should declare cyber war on states and criminals who target the country by using aggressive retaliatory strikes, says Parliament's Intelligence Security Committee (ISC). The call comes in the ISC's annual report, which says too ...
Tags: UK, cyber war, criminals, aggressive retaliatory strikes, ISC
Lack of security in the cyber world is one of the most significant threats faced by the civilized world, according to Jarno Limnell, director of cyber security at security firm Stonesoft. "But it seems that we have to experience a ...
Tags: lack of security, cyber world, cyber security, digital resources
At a time when cyberattacks on America's critical infrastructure have increased 17-fold(between 2009 and 2011),the need for highly trained cybersecurity professionals is acute.However,83%of federal hiring managers in a recent survey said it ...