The value of data to cyber criminals Plan for cyber attacks Defence in depth against cyber attack Comprehensive approach to APTs Stuxnet,Duqu,Flame,and Gauss have nothing to do with businesses that are not involved in finance and critical ...
Tags: cyber criminals, cyber attack, OTMS, IT security
A senior Republican senator on Thursday insisted there is no partisan dissent over the need for a strong national cybersecurity policy but added that a bill with Democratic backing that is stalled in the Senate is not the answer. In a ...
Tags: national cybersecurity policy, cybersecurity, SECURE IT
In what it says is an attempt to turn the tables on malicious hackers,security vendor Prolexic on Tuesday released details of vulnerabilities it has discovered in a toolkit family used by hackers to launch distributed denial of service ...
Tags: security vendor Prolexic, vulnerability, malicious hackers, DDoS
Nearly a quarter of the world's banks were hit by security breaches in the past year, a study shows. Top threats include vulnerabilities in mobile technologies and social media, financial fraud and "hacktivist" groups, according to the ...
Tags: security breaches, social media, mobile technologies, security systems
Security firm Stonesoft has released an Advanced Evasion Technique (AET) defence system and testing tool in quick succession. Stonesoft describes AETs as a new generation of hacking techniques that enable malware, viruses, worms and other ...
Tags: Stonesoft, Advanced Evasion Technique defence system, testing tool
Small and medium enterprises (SMEs) are struggling to keep IT infrastructure up to date with mobile working and the increasing volume and sophistication of cyber threats, a survey has revealed. Most SMEs (92%) now need to support remote ...
Tags: SMEs, IT infrastructure, mobile working, cyber threats
Many senior executives are still failing to understand the level of international cyber threat to their organisations, says the Information Systems Security Association (ISSA), UK chapter. "The nature of the threat is well understood in ...
Tags: ISSA, senior executives, international cyber threat, Information Systems