An increase in hacktivism and a greater prevalence of Advanced Evasion Techniques will form part of the backdrop of IT security in 2013, according to Stonesoft With 2013 just around the corner, it is time for IT security experts to reflect ...
Tags: Stonesoft, cyber threats, Evasion Techniques, IT security
Cyber crime has continued to become more professional in 2012, with the barriers to entry becoming ever lower with the emergence of increasingly powerful toolkits and exploits for sale online. In the past year, cyber criminals have used ...
Tags: Protection, Cyber Crime, Products
With so many cyber attacks in the news recently, executives are becoming increasingly concerned about their organisation’s exposure to hackers. And so they should. According to our research, more than three-quarters of the Forbes ...
Tags: cyber attacks, hacker, Internet, network
The head of the US National Security Agency (NSA) and Cyber Command, created to defend against internet-based attacks, has called on hackers to help make the web more secure. General Keith Alexander emphasised the common ground between US ...
Tags: hackers, National Security Agency, US, internet-based attacks
US intelligence officials say there is growing evidence Iran was behind recent cyber attacks that disabled computers across the Saudi oil industry. These attacks contributed to a warning last week from Defense Secretary Leon Panetta that ...
Tags: Iran, cyber attacks, oil industry, disabled computers
Viruses targeting virtual machines (VM) are growing in numbers and will soon be the dominant force in the world of cyber crime. Speaking at this week’s SNW Europe conference in Frankfurt, Joe Llewelyn, head of global sales training ...
Tags: Viruses, Vm Aware, Computer Products
Companies must take responsibility for cyber security at board level to tackle the exponential growth in attacks, the government has urged. The warning comes as ministers launch a Cyber Security for Business booklet to encourage company ...
US President Barack Obama should strongly consider issuing an executive to help secure computer networks from attack, says former White House cyber security chief Howard Schmidt. The advice comes as a Senate cyber security bill remains ...
Tags: cyber security, US, network, Internet
Orange Android devices will come pre-installed with the Lookout Mobile Security application to prevent mobile devices being affected by malware and spyware. The application will run in the background of the device, scanning applications ...
Tags: Orange Android devices, Lookout Mobile Security, malware and spyware
Current business security models fail to prepare for cyber threats in the face of highly sophisticated, powerful cyber attack tools that are no longer the preserve of nation states, as they filter down to a wider community of attackers. ...
Tags: security models, hackers, cyber attacks, Cyber criminals
International oil company Saudi Aramco claims to be over a cyber attack on 15 August and maintains that oil production was not disrupted. The company said around 30,000 workstation computers that were hit by a virus attack are back ...
Tags: International oil company, Saudi Aramco, cyber attack, oil production
The FBI has arrested another suspected member of the now-defunct hacking group LulzSec in connection with a breach of Sony Pictures Entertainment's computer systems. The 20-year-old Raynaldo Rivera surrendered to US authorities after a ...
Tags: LulzSec, Pictures Entertainment's computer systems, protected computer
The government has announced a scheme to help UK organisations respond effectively to the increase in cyber attacks. The scheme is backed by CESG, the Information Assurance arm of GCHQ, and the Centre for the Protection of National ...
Tags: UK, cyber attacks, Protection of National Infrastructure
And now, the end is near. On 23 November 2012, Gerry Pennell will leave the job of a lifetime. Four years after signing up as CIO for the London 2012 Olympics and Paralympics, his IT team has won every technology gold medal going after ...
Tags: Gerry Pennell, CIO, London 2012 Olympic Games, IT systems
Threat data Future of hardware-assisted security Why Intel bought McAfee Defence in isolation and containment Social media, cloud, big data and mobile apps Video: McAfee co-president Michael DeCesare on consumerisation and security The ...
Tags: hardware-assisted security, Intel, McAfee Defence, Social media, cloud