China’s state-controlled press is accusing Cisco of helping the U.S. government in cyberespionage. The criticisms come a week after the U.S. indicted five Chinese military personnel for allegedly hacking into several U.S. companies ...
Tags: Cyberwar Efforts, cyberespionage
SAP has significantly improved the security of its products over the past few years but many of its customers are negligent with their deployments, which exposes them to potential attacks that could cripple their businesses, according to ...
Tags: SAP Security, HTTP Services
The recent attack on computer networks at broadcasting organisations and banks in South Korea has brought cyber war into the limelight. While the cause of the attacks remains unknown, South Korean authorities say they "do not rule out the ...
Tags: Computer Products, Networks
Two U.S. lawmakers have reintroduced a controversial cyberthreat information-sharing bill over the objections of some privacy advocates and digital rights groups. As promised, Representatives Mike Rogers, a Michigan Republican, and C.A. ...
Tags: cyberthreat, digital rights, US
The Pentagon is planning to expand its cybersecurity force nearly fivefold over the next several years in a bid to bolster its defensive and offensive computer capabilities. The plan is to add about 4,000 more military and civilian ...
Network security is still as necessary as it was 15 years ago when the Black Hat Conference was first beginning. Sure the players have changed and the sophistication, but it is a classic good vs. evil scenario still. A panel of experts at ...
Tags: Network, security, Black Hat Conference
IDG News Service - India has asked Internet service providers to block certain websites and restricted users from sending bulk SMSes for two weeks after threatening content caused panic across the country, official sources said. About 156 ...
Tags: India, Internet service, SMSes, websites
Future warfare could be fought by soldiers using bullets and bombs as well as people hunched over laptops according to experts in cyber conflict. The analysis comes in response to a recent article, titled “U.S. Admits to Cyber ...
Tags: cyber war, cybercrime, Future warfare
In 1859, there was a solar event so extreme that witnesses reported seeing brilliant lights, electrical flashes, red glows and other aurora events, even in the South. It was the lead story on Sept. 3 of that year in the Memphis Daily, ...
Tags: solar event, aurora, solar maximum, solar storm
The ‘Shamoon’ malware that nixed the hard drives of 30,000 Saudi oil industry PCs in August was more of a ‘quick and dirty’ job by talented amateurs than a skilfully crafted professional cyberweapon, an analysis has ...
Tags: amatuers, cybercrime, cybercriminals, cyberwar, highlightedpost, Kaspersky
Advanced persistent threats (APTs) are real and all companies should be taking them seriously, says telecommunications company AT&T. In the past year, the company has set up an IT security team dedicated to researching APTs and making ...
Network World - LAS VEGAS -- To celebrate the 15th anniversary of the Black Hat Conference here, a panel of experts got together to expound on what they see as the privacy and security mess of our times, and they had plenty to say about the ...
Tags: U.S., Google, Conference