Controversial Chinese firm Huawei has revealed its sales revenue for 2012 is to surpass the$35bn(£21.7bn)mark,with a net profit of$2.4bn(£1.4bn)–an increase of more than 10 per cent year-on-year for both figures. The ...
Tags: Huawei, telecommunication, US, UK, China
Digital certificates issued by an authority in Turkey are being used for "man in the middle" attacks on Google properties, according to warnings issued by both Microsoft and Google. The security flaw was traced to a fraudulent digital ...
Tags: Computer Products, Soft
The challenge of attracting more women in to the technology sector has been an issue for some time now, but 2012 saw some interesting steps forward in the gender equality debate. Below are some the biggest and most interesting women in IT ...
Tags: women, IT stories, technology sector, 2012, Top 10
The most controversial tech issue taken up by the outgoing Congress was, by far, the Stop Online Piracy Act (SOPA). This legislation drew a humongous public outcry that prompted a wholesale retreat by its supporters. But thanks to the ...
Tags: SOPA, legislation, controversial tech, outgoing Congress
Digital certificates issued by an authority in Turkey are being used for "man in the middle" attacks on Google properties, according to warnings issued by both Microsoft and Google. The security flaw was traced to a fraudulent digital ...
Tags: Microsoft, Google, Turkey, security flaw
Groups of companies in the same industry could pool infrastructure resources to help each other mitigate the effects of cyberattacks and work together on security issues, a senior official in the U.S. Department of Homeland Security ...
Tags: DHS, cyberattack, security, cybersecurity
IDG News Service - The U.S. is facing a dramatically increasing threat from cyber attacks and a future attack on the country's critical infrastructure could have an effect similar to the Sept. 11 terrorist attacks of 2001, the U.S. ...
Tags: cyber attacks, critical infrastructure, Internet, cyber security, US
IDG News Service - A deeper look into the Flame malware, linked to the infamous Stuxnet, has revealed that it may be just one of four pieces of malware created by the same unknown development team. Flame became public in May after Iran ...
Tags: Flame malware, virus, malware, cyber security
IDG News Service - A tool for testing if web application firewalls (WAFs) are vulnerable to around 150 protocol-level evasion techniques was released at the Black Hat USA 2010 security conference on Wednesday. The tool and the research ...
Tags: web application firewalls, Black Hat USA 2010, cyber security
20,000 PCs in the UK could be cut off from the web on Monday 9 July 2012, as a consequence of the DNS Changer virus. Infected machines will no longer be able to access websites, e-mail, chat or social networking sites such as Facebook, ...
Tags: UK, computer, DNS Changer virus, networking site, cyber security
The UK is to offer around 100 18-year-olds training in advanced IT skills to bolster the expertise of intelligence agencies in fighting cyber crime. The scheme was announced by foreign secretary William Hague during a visit to Bletchley ...
Tags: UK, GCHQ, cyber crime, training, advanced IT skills, 18-year-olds
BT is to extend its cyber security agreement with the Ministry of Defence (MOD) in a deal that will see the company expand its cyber defence service. BT said work had already begun on the seven-year agreement that builds on an existing ...
An increase in hacktivism and a greater prevalence of Advanced Evasion Techniques will form part of the backdrop of IT security in 2013, according to Stonesoft With 2013 just around the corner, it is time for IT security experts to reflect ...
Tags: Stonesoft, cyber threats, Evasion Techniques, IT security
Cyber crime has continued to become more professional in 2012, with the barriers to entry becoming ever lower with the emergence of increasingly powerful toolkits and exploits for sale online. In the past year, cyber criminals have used ...
Tags: Protection, Cyber Crime, Products
Enterprise IT security professionals faced increasingly sophisticated, stealthy and dynamic threats in 2012, but numerous surveys revealed that knowledge and understanding of the latest attack techniques are lacking in many organisations. ...
Tags: IT security, user security awareness, IT industry, cyber