Information security awareness needs to be company-wide, according to Julie Peeler, director of the (ISC)2 Foundation. "Organisations need to think beyond IT when planning IT security awareness training, and tackle it from the bottom up, ...
Tags: IT Security, Company-Wide, Julie Peeler, awareness training
The unique identifiers of 1 million Apple iOS devices that hackers leaked last week were stolen from the servers of a Florida-based digital publishing firm called Bluetoad. Bluetoad develops digital distribution technologies. Its ...
Tags: Apple iOS devices, US, Cybercrime, Hacking
Online cyber criminal markets are putting very sophisticated attack tools into the hands of more low-level attackers, say cyber intelligence specialists. More attackers are now getting their hands on tools like Zeus and SpyEye, according ...
Tags: Online cyber criminal, sophisticated attack tools, Cyber Attack Tools
More than two-fifths of companies worldwide have failed to prepare for cyber threats, a survey from security company Kaspersky Lab has revealed. Some 41% of more than 3,300 IT professionals polled in 22 countries – including 200 in ...
Tags: cyber threats, Kaspersky, online attacks
The value of data to cyber criminals Plan for cyber attacks Defence in depth against cyber attack Comprehensive approach to APTs Stuxnet,Duqu,Flame,and Gauss have nothing to do with businesses that are not involved in finance and critical ...
Tags: cyber criminals, cyber attack, OTMS, IT security
Sensitive personal information about more than 1,000 children has been published on the UK Independent Schools Guide website after an alleged cyber attack. The information was contained in a database of applications for top independent ...
Tags: Sensitive personal information, UK Independent Schools, cyber attack
Cybersecurity researchers have uncovered a new threat targeting infrastructure in the energy sector that is believed to have hit at least one organisation. The malware, dubbed Shamoon, corrupts files on a compromised computer and ...
Tags: threat targeting infrastructure, computer security, computer attack
The US Cybersecurity Bill, originally intended to dictate minimum standards of online security for critical infrastructure in the US, has been voted down in the Senate over criticisms that it gave authorities too much power to spy on users. ...
Tags: Cybersecurity Bill, Joe Lieberman, digital Dark Ages, cyber security
German engineering firm Siemens has issued a fix for the software vulnerabilities in its programmable logic controllers (PLCs) that were exploited by Stuxnet. The computer worm was discovered in 2010 when it caused malfunctions at ...
Tags: Siemens, software, programmable logic controllers, PLCs, Stuxnet
Legacy smart electrical power grids are a prime target for cyber attack and security needs to be built into these critical systems, a study has found. The most prevalent cyber threat reported by the global energy sector is extortion, ...
Tags: cyber attack, prime target, critical systems, electrical power grids
Law enforcement officers have arrested six people in the UK and 12 in the US in an FBI-led sting operation that netted a total of 24 credit card cyber fraudsters in 13 countries. The arrests follow a two-year undercover FBI investigation ...
Tags: FBI-LED Sting Operation, Law enforcement officers, UK, Credit Card Data