The recent attack on computer networks at broadcasting organisations and banks in South Korea has brought cyber war into the limelight. While the cause of the attacks remains unknown, South Korean authorities say they "do not rule out the ...
Tags: Computer Products, Networks
The next world war could feature cyber attacks, but not in the way that most people assume, according to the Symantec EMEA CTO Greg Day. Analysis: The era of geopolitical cyber wars Police prevented from chasing cyber criminals from ...
Tags: Symantec CTO, cyber attack, cyber security
The scary stories from the Web are getting worse.First there were a few stolen credit card numbers.Then there were a few thousand.Now we hear about millions of financial records being exposed by security breaches,and we grow numb to the ...
Tags: Code Safeguard, Developers, Internet
According to a new data breach report from Verizon, authentication attacks and “hacktivism” will continue to pose a threat to organisations in 2013. The newly released Verizon Data Breach Investigation Report noted that while ...
Tags: Verizon, authentication attacks, hacktivism
The UK Defence Committee is urging the Government to be more vigorous in its approach to cyber threats. A new report released by the Committee says that the British military is now too dependent on information and communications ...
Tags: military, IT, cyber threats, information, communications technology
This is the third in a series of interviews with C-level executives responsible for cyber security and privacy in business and government, who also happen to be thought leaders. (Remember, as I mentioned previously, "C-level executive" and ...
Tags: interviews, cyber security, privacy, business, government, web security
Government departments have been given the go-ahead to use iPhones to send and receive sensitive emails, as part of moves to broaden the number of approved public sector mobile devices beyond BlackBerrys. Under new guidelines, civil ...
Tags: iPhone, mobile device, Apple device, BlackBerry
Cybergeddon, a complete take-down of the internet, is undoubtedly within the power of some nation states, but is unlikely, say security industry experts. Bringing down the internet would not be in anyone’s interest, said Fred Piper, ...
Tags: Cybergeddon, internet, security industry, security consulting
Future warfare could be fought by soldiers using bullets and bombs as well as people hunched over laptops according to experts in cyber conflict. The analysis comes in response to a recent article, titled “U.S. Admits to Cyber ...
Tags: cyber war, cybercrime, Future warfare
Israeli and Palestinian forces have taken to the Internet to accelerate their wartime propaganda via social media. As the forces continue their conflict on the ground, they’ve also launched a war of hashtags, English-language tweets ...
Tags: cyber war, Facebook, Internetsocial media
After a two-day outage, Internet access in war-torn Syria appears to be for the most part restored on Saturday, according to reports from several sources. “Renesys confirms a largely complete restoration of the Syrian Internet this ...
Tags: cyber war, highlightedpost, internet blackout, Middle East, Syria
The UK should declare cyber war on states and criminals who target the country by using aggressive retaliatory strikes, says Parliament's Intelligence Security Committee (ISC). The call comes in the ISC's annual report, which says too ...
Tags: UK, cyber war, criminals, aggressive retaliatory strikes, ISC
Lack of security in the cyber world is one of the most significant threats faced by the civilized world, according to Jarno Limnell, director of cyber security at security firm Stonesoft. "But it seems that we have to experience a ...
Tags: lack of security, cyber world, cyber security, digital resources
Nearly two-thirds of UK citizens back pre-emptive cyber strikes on foreign states that pose a credible threat to national security,a survey has revealed. However,46%of those believe it depends on the level of threat posed,according to a ...
Tags: UK citizens, cyber strikes, security information event management firm
Big data and intelligence-driven security are to be the focus of the RSA Conference Europe 2012 in London next month. Three of the keynote sessions are related to these topics and they are represented in just about every time slot of the ...
Tags: Big data and intelligence-driven security, RSA Conference Europe 2012