SQL injection (SQLi) attacks rose 69% in the second quarter of 2012 compared with the previous quarter, according to the latest report from secure cloud hosting firm FireHost. FireHost said that, between April and June, it blocked nearly ...
Tags: SQL injection, SQLi attacks, FireHost, secure cloud hosting
IDG News Service - Get your conspiracy theories ready: Two founders of The Pirate Bay were due to speak at the Hack in the Box security conference in Kuala Lumpur on Wednesday, but didn't show up. The 3 p.m. speaking slot for Peter ...
Tags: Pirate Bay, Box security conference, Hack, cyber security
IDG News Service - The Supreme Court in the Philippines has temporarily restrained the government from enforcing a new controversial cyber law, in response to petitions from civil rights and journalists groups in the country. In a ...
Tags: cyber law, cybercrime, cyber security, Internet
IDG News Service - The U.S. Federal Communications Commission is advising smartphone users on how to protect their mobile devices and data from mobile security threats. The Commission released an online tool called the "Smartphone ...
Tags: FCC, security advice, smartphone, mobile devices.data
Microsoft will "draw a line in the sand" come April 2014 when Windows XP exits support, security researchers said today, even if millions of customers are still running the aged OS and a zero-day bug threatens the Windows ecosystem. Or ...
Tags: Microsoft, Windows XP, OS, Windows ecosystem
The Department of Homeland Security has chosen to feature Code Dx, software assurance visualization technology developed by the Secure Decisions division of Applied Visions, on its Build Security In website. NORTHPORT, NY, August 05, 2012 ...
Tags: Secure Decisions, Security, Website, NIST SAMATE Website, software
Mandatory risk management for social networks could form part of a European Commission legislative proposal on network and information security, it was revealed as a public consultation on the issue was announced on Monday. Europe's law ...
Tags: EU, New Rules, Cybersecurity, social networks could
Normally if you find a rogue outlet strip, or a user happens to bring his or her own surge protector to use you might not think much of it. Thanks to a new device called the Power Pwn, though, it might soon be cause for concern. A company ...
Tags: outlet strip, surge protector, Power Pwn, hacking tool
Public private partnerships are key to the UK’s cyber security strategy, says Cabinet Office minister for political and constitutional reform, Chloe Smith. “We are all in this together. The government recognizes that and ...
Tags: cyber security, constitutional reform, Govnet Cyber Security Summit 2012
IT security professionals need to transform the profession if they are to persuade business they are doing a good job, according to Mark Brown, director of information security at Ernst & Young. “Most organisations think information ...
Tags: IT security, information security, Global Information Security Survey
The government has announced a scheme to help UK organisations respond effectively to the increase in cyber attacks. The scheme is backed by CESG, the Information Assurance arm of GCHQ, and the Centre for the Protection of National ...
Tags: UK, cyber attacks, Protection of National Infrastructure
The UK national Cyber Security Challenge has announced the winner of its Can you talk security? competition devised by BT and Get Safe Online. Winner Leo Pickford, an IT manager at a design company, could soon see his ...
Tags: UK national Cyber Security Challenge, BT, Get Safe Online, net security
And now, the end is near. On 23 November 2012, Gerry Pennell will leave the job of a lifetime. Four years after signing up as CIO for the London 2012 Olympics and Paralympics, his IT team has won every technology gold medal going after ...
Tags: Gerry Pennell, CIO, London 2012 Olympic Games, IT systems
The University of Warwick has entered an agreement with information security professional body (ISC)2 to support the entry of its cyber security masters graduates into the workforce. Students will be able to complete a compact Certified ...
Tags: University of Warwick, CISSP, cyber security, IT security community
The European Commission (EC) is considering making it mandatory for companies to report cyber attacks to harness the benefits of open dialogue, says vice-president Neelie Kroes. Despite industry opposition, open discussion about cyber ...
Tags: cyber, European Commission, industry opposition, security strategy