Criminals are sending malicious emails that purport to come from payroll services firms in order to infect with malware the computers of payroll administrators from various companies, according to researchers from the SANS Internet Storm ...
Tags: criminals, malicious emails, payroll services firms, ISC
More than 120 students were awarded £200,000 in scholarships and awards this week, as the Institution of Engineering and Technology (IET) rewarded hard-working UK students that choose to study computer science and engineering ...
Tags: scholarships, computer science, engineering subjects, degree course
There are about 2.2 million people working as information security professionals today, says Hord Tipton, executive officer for security education and credentialing organization (ISC)2 and former CIO of the U.S. Department of the Interior. ...
As many as 300,000 PCs and Macs will drop off the Internet in about 65 hours unless their owners heed last-minute calls to scrub their machines of malware. According to a group of security experts formed to combat DNSChanger, between a ...
Tags: Internet, PCs and Macs, infected computers
Campaigners have slammed the government’s draft proposals to for its Communications Data Bill, which will make it easier for security and police services to spy on e-mails, phone calls and internet activity. The bill will now be ...
The UK should declare cyber war on states and criminals who target the country by using aggressive retaliatory strikes, says Parliament's Intelligence Security Committee (ISC). The call comes in the ISC's annual report, which says too ...
Tags: UK, cyber war, criminals, aggressive retaliatory strikes, ISC
Half of companies worldwide lack knowledge about potential security threats they may face, a global IT risks survey has revealed. Almost a third of more than 3,000 IT professionals, including 200 from the UK, polled by security firm ...
Advanced persistent threats (APTs) are real and all companies should be taking them seriously, says telecommunications company AT&T. In the past year, the company has set up an IT security team dedicated to researching APTs and making ...
(ISC)2 is inviting applications for scholarships worth a total exceeding 90,000 pound to promote information security studies for women,undergraduate,graduate and post-graduate students. The scholarship scheme,run by the (ISC)2 ...
Tags: (ISC)2;, scholarships, Information Security Scholarships
The UK national Cyber Security Challenge has announced four face-to-face competitions for the next round of the current challenge. Cyber Security Challenge UK runs a series of national inspirational competitions aimed at attracting ...
Tags: Cyber Security Challenge, face-to-face competitions, cybersecurity
Unlicensed copies of popular software Keep up to date Patch applications with security updates Conficker still a threat Malicious key generation(keygen)software is one of the fastest-growing types of a malware,according to the latest ...
Tags: top cyber threats, malicious key, malicious keygen software
The CESG,the Information Assurance(IA)arm of GCHQ,has launched a UK scheme to develop skills and certify IT professionals in IA and cyber security. The CESG Certification for IA Professionals scheme aims to help the government and UK ...
Tags: CESG certification, Information Assurance, cyber security unveiled, UK
Information security awareness needs to be company-wide, according to Julie Peeler, director of the (ISC)2 Foundation. "Organisations need to think beyond IT when planning IT security awareness training, and tackle it from the bottom up, ...
Tags: IT Security, Company-Wide, Julie Peeler, awareness training
Castleford Tigers has announced that International Sports Clothing Australia Pty Ltd (ISC) will be the club's new apparel partner for the 2013 season. The move sees the Tigers join fellow Super League heavyweights St Helens, Leeds Rhinos, ...
Tags: Castleford Tigers, Clothing, apparel partner, Sports Clothing
Mobile device management (MDM) is not about security, according to Eric Green, senior vice-president of business development at security firm Mobile Active Defense Partners. "There is no security in MDM; its ability to secure a device is ...
Tags: MDM, BYOD, ISC, Eric Green, mobile security