The European Commission (EC) is considering making it mandatory for companies to report cyber attacks to harness the benefits of open dialogue, says vice-president Neelie Kroes. Despite industry opposition, open discussion about cyber ...
Tags: cyber, European Commission, industry opposition, security strategy
Four UK youths acting in the name of activist hacking collective Anonymous cost PayPal £3.5m as a result of cyber attacks carried out 2010 and 2011, a court has heard. The distributed-denial-of-service (DDoS) attacks were carried ...
Tags: distributed-denial-of-service, cyber attacks, DDoS attacks
If attackers want to get in to an organisation's information systems, they will, says Frank Coggrave, general manager for Europe at e-discovery firm Guidance Software. "Many IT departments still have their heads in the sand on this issue. ...
Tags: information systems, IT departments, security investments, Software
Advanced malware that evades signature-based detection has increased nearly 400% in the past year, research by security firm FireEye has revealed. Companies are being hit by an average of 643 successful infections a week, according to the ...
Tags: FireEye, cyber attack, firewalls, intrusion prevention systems
Kaspersky Lab has outlined key security trends of 2012 and presented their views on the core threats of 2013. The most notable predictions for the next year include the continued rise of targeted attacks, cyber-espionage and nation-state ...
Tags: malware, Kaspersky, cyber espionage, cyber
This practical information security title, offers a unique insight into the journey that an Information Security Manager goes through in a typical year. 'Once more unto the Breach: Managing information security in an uncertain world' is ...
Tags: information security, IT industry, cyber safety, networking
Future warfare could be fought by soldiers using bullets and bombs as well as people hunched over laptops according to experts in cyber conflict. The analysis comes in response to a recent article, titled “U.S. Admits to Cyber ...
Tags: cyber war, cybercrime, Future warfare
A growing army of malware delivery networks, known as malnets, account for two thirds of all cyber attacks, and security firm Blue Coat claims most current technologies offer an inadequate response to the threat, according to new analysis. ...
Tags: Blue Coat, botnet, cyber attack, Malnet, malware
EMC said today it has agreed to buy privately-held start-up Silver Tail Systems, a vendor of real-time web session intelligence and behavioural analysis. EMC plans to use the purchase to beef up its RSA security division in the rapidly ...
Tags: EMC, Silver Tail, web intelligence, Silver Tail Systems
Details have emerged of an extraordinary attack in which millions of DSL broadband routers in Brazil were hit by a serious software flaw that allowed criminals to gain complete control of all web traffic running through them. First ...
Tags: Broadcom chipset, cyber attacks, DNS, malware, broadband routers
A cyber security think tank has published a manual studying how international law applies to conflicts in cyberspace, where the laws of conventional warfare are more difficult to apply. The manual comes from experts working with the ...
Tags: cyber attacks, cyber security, cyber warfare, cyberspace, nternational law
The U.N.’s civil aviation body will recommend creating a cyber security task force at a meeting next week in Canada, as new technologies introduced into aviation systems are increasing the risk of cyber attacks. The International ...
Tags: cyber security, UN, United Nations, new technologies, cyber
A U.S. congressional committee appeared to come away still in doubt about the security of networking equipment from Chinese firms Huawei Technologies and ZTE after holding a Thursday hearing in which the two companies tried to dispel ...
Tags: Huawei, ZTE, U.S.Officials, Spying Concerns
With the advent of mobility and the influx of BYOD in enterprise, employers are struggling to keep control of their networks, according to John Yun, Director, Product Marketing, Blue Coat. Yun, who is in Dubai promoting Blue Coat’s ...
Tags: Blue Coat botnets, BYOD, cyber attacks, hackers
Groups of companies in the same industry could pool infrastructure resources to help each other mitigate the effects of cyber attacks and work together on security issues, a senior official in the U.S. Department of Homeland Security ...
Tags: cyber attacks, DHS, homeland security, security issues