India needs to build a military industrial complex by enlisting large and medium cluster of industries, said BrahMos Aerospace founder Dr. A Sivathanu Pillai at the Deftronics 2014 in Bangalore. Addressing the event organised by India ...
Tags: Electrical, Electronics
Oil giant BP is currently having a “big internal debate” about how it can lock down personal computers without losing out on flexibility for employees, as a direct result of the increasing threat of cyber attacks. Outgoing CIO ...
According to Protiviti’s 2013 Security and Privacy Survey, a large number of companies are not adequately prepared to respond to a data breach of IT security crisis, despite a broader recognition that cyber threats are more prevalent. ...
Tags: Data Breaches, Security
CSO - In January 2010, Google shocked the cyber world by confessing it had been the target of an advanced persistent threat lasting months and mounted by hackers connected to China's People Liberation Army. "[We] have evidence to suggest ...
Tags: Computer Products
A Pentagon report has accused the Chinese government of cyber attacks against military and civilian computer systems in the US. It marks the first time US authorities have directly suggested that Beijing is behind computer hacking, with ...
Tags: Pentagon, Computer Systems
China's government and military appear to be directly involved in cyber-attacks against the U.S., according to a report released Monday by the U.S. Department of Defence. The conclusion, contained in an?annual report?evaluating China's ...
Tags: Pentagon, Cyberattacks, Computer Products
The US government is to introduce a "cyber espionage review" process into future purchases of IT after the measures were passed in a new funding law signed this week by President Obama. It follows reports in the press since the beginning ...
Tags: Cyber Espionage Review, IT, policy
In a move to counter recent reports claiming that a special unit in the Chinese Army is behind repeated cyber attacks on U.S. institutions, the nation Thursday claimed its military and defence ministries websites are routinely hacked from ...
27 million new malware strains found in 2012, at an average of 74,000 new samples per day BERKSHIRE, ENGLAND, February 08, 2013 /24-7PressRelease/ -- PandaLabs, the antimalware laboratory of Panda Security, has released its 2012 Annual ...
Cyber attacks on U.S. banks over the last several months reflect a frightening new era in cyber warfare, according to security expert Darren Hayes, who says that corporations are unprepared to battle such attacks because of a shortage of ...
Tags: cyber attacks, U.S.banks, DDoS Bank
The UK is to offer around 100 18-year-olds training in advanced IT skills to bolster the expertise of intelligence agencies in fighting cyber crime. The scheme was announced by foreign secretary William Hague during a visit to Bletchley ...
Tags: UK, GCHQ, cyber crime, training, advanced IT skills, 18-year-olds
US intelligence officials say there is growing evidence Iran was behind recent cyber attacks that disabled computers across the Saudi oil industry. These attacks contributed to a warning last week from Defense Secretary Leon Panetta that ...
Tags: Iran, cyber attacks, oil industry, disabled computers
Iran’s national CERT has warned of a new type of data-wiping malware that bears some of the hallmarks of a cyberattack that severely disrupted the country’s oil industry earlier this year. The exact nature of the latest attack ...
Tags: Cyberattack, Oil Hit, Computer Products
Kaspersky Lab has outlined key security trends of 2012 and presented their views on the core threats of 2013. The most notable predictions for the next year include the continued rise of targeted attacks, cyber-espionage and nation-state ...
Tags: malware, Kaspersky, cyber espionage, cyber
A cyber security think tank has published a manual studying how international law applies to conflicts in cyberspace, where the laws of conventional warfare are more difficult to apply. The manual comes from experts working with the ...
Tags: cyber attacks, cyber security, cyber warfare, cyberspace, nternational law