Internet connectivity in North Korea was restored on Friday following a 36-hour outage that the country’s official media blamed on international hacking. Connections to the Star, North Korea’s sole Internet service provider, ...
The Home Office has announced a plan to bring together the skills of the police, industry experts and academics in a Cyber Crime Reduction Partnership (CCRP) to help to stamp out cyber-crime. Security minister James Brokenshire announced ...
China has offered to open discussions with the US on the issue of cyber security, following tit-for-tat accusations by both sides of hacking and stealing data from government and corporate websites. The Chinese offer follows comments by ...
Tags: China, US, Cyber Security
Simon Whitburn, Vice President of International Sales, AccessData According to AccessData Group, the Middle East is fast becoming a prime target for cyber criminals, mostly because so many regional organisations are underequipped to ...
Tags: AccessData, Simon Whitburn, Vice President
The Reserve Bank has denied reports that its computer systems or networks have been compromised by hackers, saying that at no point has any data or information been lost or its systems corrupted. Responding to a report in yesterday's ...
Tags: IT security, computer systems, cyber attacks
China's foreign minster on Saturday called on nations to cooperate on Internet security, rather than wage cyberwarfare, as he denied accusations in a recent report that the country's military was behind hacking attacks. "Cyberspace needs ...
Tags: Internet security, cyberwarfare, China
The next world war could feature cyber attacks, but not in the way that most people assume, according to the Symantec EMEA CTO Greg Day. Analysis: The era of geopolitical cyber wars Police prevented from chasing cyber criminals from ...
Tags: Symantec CTO, cyber attack, cyber security
The London Olympics faced six major cyber attacks during the Games out of some 165 million individual security-related "events" identified by the IT team put together by Gary Pennell, the CIO of the London 2012 Olympics. Cloud was a ...
The chance of infection by malware from counterfeit software is three in 10 for businesses, and one in three for consumers, according to a new study commissioned by Microsoft and conducted by research firm IDC. Police prevented from ...
Tags: malware, counterfeit software, Microsoft
China and India were the top two “victim” countries in the Asia Pacific, according to a recent Web threat report. Conducted by Web and mobile security firm Websense, the 2013 Threat Report also ranked Taiwan, Philippines, ...
Tags: China, India, victim countries, the Asia Pacific
The company is the latest to be attacked after recent cyber attacks on Apple, Facebook and Twitter. Evernote's security team discovered suspicious activity in its network which attempted to access secure areas of its service. Evernote ...
Tags: cyber attack, Apple, Facebook, Twitter
Prices are falling and the number of services is increasing as developers in the online underground compete fiercely for criminals looking to purchase botnets and other tools to mount cyber attacks. The trends in the so-called ...
Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, said security experts. Over the past few years, the security strategies of many companies and ...
Tags: IT security strategies, emerging cyber threats, security strategies
Security company, FireEye, has announced a new threat protection platform designed to help enterprises deploy new security models to counter modern cyber attacks. Many traditional defences, such as firewalls and anti-virus, are not enough ...
In a move to counter recent reports claiming that a special unit in the Chinese Army is behind repeated cyber attacks on U.S. institutions, the nation Thursday claimed its military and defence ministries websites are routinely hacked from ...