Prime Minister David Cameron is to enter talks with China over cyber spying after raising the issue with Chinese Prime Minister Li Keqiang during his visit to the country. It follows on from a long-running war of words between the US and ...
Tags: Cyber Spying, Talks with China
Spending on cyber defence is set to increase despite the coalition government announcing a further £11.5bn of cuts from Whitehall spending set out for 2015-2016. The Treasury announced the decision following a series of phone calls ...
Tags: Cyber Security, Cyber Conflict
In a move to counter recent reports claiming that a special unit in the Chinese Army is behind repeated cyber attacks on U.S. institutions, the nation Thursday claimed its military and defence ministries websites are routinely hacked from ...
HP on Monday unveiled its Big Data Security strategy, describing how combining the enterprise search and knowledge management resources from its Autonomy subsidiary with its ArcSight security-event and information management (SIEM) can ...
Tags: HP, Big Data Security Strategy, SIEM
A report released National Audit Office revealed that the UK IT skills shortage means that Britain could have trouble defending itself from cyber attacks over the next 20 years. The UK was hit by over 40 million cyber attacks in 2011 ...
Tags: National Audit Office, UK, IT industry
Cyber attacks in the UK cost the country up to 27bn each year. A report by the National Audit Office warned that the IT skills shortage in Britain could make it vulnerable against cyber attacks for the next 20 years. The UK suffered ...
Tags: UK, Cyber attacks, cyber security
The European Commission’s latest cyber security strategy has been slammed by a member of the European Parliament, who accused the strategy of being “incoherent and lacking in focus” on Thursday. The Cyber Security ...
Tags: Politician, EU, Cyber Security Strategy
BT is to extend its cyber security agreement with the Ministry of Defence (MOD) in a deal that will see the company expand its cyber defence service. BT said work had already begun on the seven-year agreement that builds on an existing ...
An increase in hacktivism and a greater prevalence of Advanced Evasion Techniques will form part of the backdrop of IT security in 2013, according to Stonesoft With 2013 just around the corner, it is time for IT security experts to reflect ...
Tags: Stonesoft, cyber threats, Evasion Techniques, IT security
US intelligence officials say there is growing evidence Iran was behind recent cyber attacks that disabled computers across the Saudi oil industry. These attacks contributed to a warning last week from Defense Secretary Leon Panetta that ...
Tags: Iran, cyber attacks, oil industry, disabled computers
Japan's Finance Ministry has uncovered evidence of a major Trojan cyber-attack on its computer systems that lay undetected for almost two years, according to local sources. Ministry officials have admitted that the unspecified Trojan, ...
Tags: Japan, Finance Ministry, Trojan cyberattack, computer systems
A group of about 30 young people will attend a cyber security boot camp next month set up by the organisations responsible for the Cyber Security Challenge . The boot camp is receiving input and support from the Metropolitan Police ...
Tags: cyber security, training camp, Internet, cyber
With cybercrime revealed to cost Scottish businesses an estimated 5bn academics are urging firms to ensure IT staff have the right skills to overcome new and emerging threats. To enable them to do that, Edinburgh Napier University is ...
Tags: cybercrime, IT staf, IT industry, cyber security
Cybergeddon, a complete take-down of the internet, is undoubtedly within the power of some nation states, but is unlikely, say security industry experts. Bringing down the internet would not be in anyone’s interest, said Fred Piper, ...
Tags: Cybergeddon, internet, security industry, security consulting
A cyber security think tank has published a manual studying how international law applies to conflicts in cyberspace, where the laws of conventional warfare are more difficult to apply. The manual comes from experts working with the ...
Tags: cyber attacks, cyber security, cyber warfare, cyberspace, nternational law