An increasing number of vulnerability researchers will focus their attention on industrial control systems(ICS)in the year to come,but so will cyberattackers,security experts believe. Control systems are made up of supervisory software ...
Tags: SCADA security, ICS, critical infrastructure, control systems
Cybergeddon, a complete take-down of the internet, is undoubtedly within the power of some nation states, but is unlikely, say security industry experts. Bringing down the internet would not be in anyone’s interest, said Fred Piper, ...
Tags: Cybergeddon, internet, security industry, security consulting
As more traditional business functions become cloud offerings, there are certain questions organisations need to ask before moving to the cloud. This was the message of Mike Lynch, the former CEO of HP-owned Autonomy, who left the company ...
Tags: cloud offerings, Autonomy, cloud computing, IT industry, computer
The latest release of IndigoVision's award winning security management solution sees it becoming the security industry's first end-to-end solution to deliver evidential video that can be guaranteed tamper free. "Not many people are aware ...
According to a new research report from the analyst firm Berg Insight, shipments of wireless M2M modules for security applications in EU27+2 is forecasted to grow from 2.9 million in 2011 at a compound annual growth rate (CAGR) of 47.1 ...
Tags: Security Research Report, shipments of wireless M2M modules
Chubb Fire & Security UK provided more than 500 business owners and managers with essential information and advice on keeping their people and premises safe and secure as part of a free seminar open to all businesses in the UK. Chubb, a ...
Tags: UK Businesses, Fire and Security, seminars
2012 has been an eventful year for the security industry–with the crowds at the Olympics and changes in legislation surrounding squatting being just a couple of the high profile issues that drew attention to the importance of ...
Tags: security industry, Olympics, MLA
The three finalists of Microsoft's inaugural BlueHat competition, to develop innovative computer security protection technologies, have been announced. The competition, which ran from 3 August 2011 to 1 April 2012, is aimed at stimulating ...
Tags: Microsoft, innovative computer, security protection technologies
The planned introduction of more than 1,900 new generic top-level domain (gTLD) names by Internet Corporation for Assigned Names and Numbers (Icann) could have security implications, researchers have warned. The plan to allow web ...
Tags: gTLD, Icann, security implications
The amount of mobile Android malware has surged this year, from a count of 30,000 malware specimens in June to almost 175,000 last month, according to Trend Micro’s Security Roundup report for the third quarter of this year. ...
Tags: Android, apps, Google, highlightedpost, malware, security, Trend Micro
The UK should declare cyber war on states and criminals who target the country by using aggressive retaliatory strikes, says Parliament's Intelligence Security Committee (ISC). The call comes in the ISC's annual report, which says too ...
Tags: UK, cyber war, criminals, aggressive retaliatory strikes, ISC
The University of Cambridge and Imperial College are pooling their resources to create a high-performance computing (HPC) service that will offer some of the UK’s fastest computer resources to industry through the cloud. The ...
Tags: universities, HPC, computer resources, cloud
Despite vowing that fighting cybercrime is high on its agenda, the European Commission increased its planned cyber security budget by just 14 percent through 2020, an amount one security expert referred to as “paltry.” For the ...
Tags: cyber security, cybercrime, highlightedpost, budget
Researchers from Israel-based IT security firm Seculert have uncovered a custom-made piece of malware that infected hundreds of point-of-sale (PoS) systems from businesses in 40 countries in the past few months and stole the data of tens of ...
Tags: data, dexter, highlightedpost, israel, malware, POS, research, seculert
The world is becoming increasingly connected, so the need for security and privacy is integral to modern society says Raj Samani, vice-president and CTO of McAfee Europe. With everything becoming connected, from smart meters to cars, ...
Tags: security, privacy, McAfee Europe