Throughout 2015, the world has watched with great interest the development of China-U.S. relations, as many believe almost every interaction between the world's top two economies has a bearing on all major global issues. Here are some ...
Tags: China-U.S.Relations
At the opening of the second World Internet Conference on Wednesday, China made sure its voice was heard: Every country has the right to create its own Internet governance model, and the cyber sovereignty of all nations should be respected. ...
Tags: cyber sovereignty, Internet
Chinese President Xi Jinping delivers a keynote speech at the 2nd World Internet Conference in Wuzhen, east China's Zhejiang Province on Wednesday, December 16 2015. [Photo: Xinhua] Chinese President Xi Jinping has urged all countries to ...
The UK continues to struggle against cyber criminals with no clear victory in sight. That's what the House of Commons Home Affairs Committee heard from the cyber security industry as experts gave evidence about e-crime. "I don't think the ...
Tags: Computer Products, software
Indian outsourcing and services company Infosys has teamed up with Queen's University Belfast to conduct joint research into the global cyber security threat. The partnership brings together Queen's University Belfast's Centre for Secure ...
Tags: Computer Products, Computer
A Chinese hacking ring, which has been active for four years, has been stealing data from players of more than 30 massively multiplayer online (MMO) role-playing games. That's according to research by security software vendor Kaspersky ...
Tags: Online Games, Computer Products
RPM International Inc. announced that Arturo Hernandez has joined the company as director of global compliance. In this role, he will be responsible for managing the company’s corporate compliance program worldwide. Hernandez most ...
Tags: Global Compliance, RPM
The "scenes of cyber crimes" are being disrupted by organisations and IT professionals that do not know how to respond to a cyber attack, undermining criminal investigations before they have even started. That is one of the warnings of ...
Media organisations and journalists are coming under increasingly regular cyber-attacks, with hacking being used as a tool to censor the press. "We have seen distributed denial of service attacks against individual journalists and against ...
Tags: cyber-attacks, hacks, cyber security
Children as young as 11 years old are developing malicious code to steal personal information from online gamers, according to antivirus software provider AVG. The Q4 2012 Community Powered Threat Report reveals some schoolchildren have ...
Tags: AVG, malicious code, cyber security
Following its latest threat report, security firm AVG has noted a “disturbing” new trend in the world of cybercrime – children with enough programming skills to code and distribute their own malware. The company said it ...
Tags: AVG, cybercrime, malware
Cyber crime has continued to become more professional in 2012, with the barriers to entry becoming ever lower with the emergence of increasingly powerful toolkits and exploits for sale online. In the past year, cyber criminals have used ...
Tags: Protection, Cyber Crime, Products
Cyber crime costs UK organisations an average of £2.1m a year each, according to the 2012 Cost of Cyber Crime study by the Ponemon Institute. The cost of attacks on UK organisations range between £400,000 and £7.7m, the ...
Tags: cyber crime costs, cyber attacks, theft, information assets
A White House executive order on cyber security is "close to completion," according to Janet Napolitano, US Secretary of Homeland Security. The news comes just weeks after former White House cyber security chief Howard Schmidt said US ...
Tags: White House, US, cyber security, network