InformationWeek
The pioneering Stuxnet computer virus, which was designed to attack a single Iranian uranium enrichment facility, went on to infect PCs around the world. Security experts have identified thousands of resulting Stuxnet infections. On Monday ...
Symantec predicts cyber crime developments in 2013
Wired (blog)
Nations or organized groups of individuals will continue to use cyber tactics in an attempt to damage or destroy the secure information or funds of its targets. In 2013, we will see the cyber equivalent of saber rattling, where nation states ...
Petraeus revelation began as cyber-harassment probe; investigation ended 4 ...
NBCNews.com (blog)
After investigating a potential case of "cyber-harassment" for several months, the FBI wrapped up its case after interviewing Paula Broadwell -- the biographer of former CIA director David Petraeus -- on Friday, Nov. 2, four days ... "I was contacted ...
STONESOFT'S UPDATED STRATEGY: AIMING AT RAPID GROWTH IN 2013 ...
Reuters
The company's updated strategy for the years 2013-2014 is based on rapid growth in the rapidly growing security market. Stonesoft's growth strategy is divided into cyber security-, customer-, product-, channel-, and marketing strategies, each of which ...
Cyber-Theft from Our Nation's Banks a Growing Threat
Wizbang (blog)
Banks and the financial services industry need to step up their game on cyber security and lawmakers should act to bring more transparency to the process. The days of just doing a minimal job at prevent cyber-theft must end and better theft prevention ...
Israel police to launch cyber-security unit
Jerusalem Post
Speaking at the HLS conference on homeland security in Tel Aviv, Danino said that he participated in an Interpol conference in Rome last week in which cyber crime was identified as an issue that threatens the whole world. “Terrorist groups and ...
Introducing the Michigan Cyber Range
Public CIO (blog)
What test & research facilities are quipped and available to simulate different advanced malware attack scenarios – without impacting operational networks? Is there a way to bring together world-class training, virtual ... Critical areas that will ...
ICAO must act on cyber security
Air Traffic Management
Cyber security encompasses the protection of electronic systems from malicious electronic attackand the means of dealing with the consequences of such attacks. It comprises managerial, operational and technical activities, and relates to the ...
Lunarline Seeks to Fill Open Positions at Corporate Gray Security Clearance ...
Sacramento Bee
12, 2012 -- /PRNewswire/ -- Cyber security and privacy company, Lunarline, will be at the Corporate Gray Security Clearance Job Fair on Friday, November 16. The event will be held from 9:00am to 12:30pm in the Waterford Reception Center in Springfield, ...
Communication Ministers Urge Int'l Cooperation for Cyber Security
Liberian Daily Observer
A high level ministerial meeting on “Addressing the challenges of a Hyperconnected World” has called for international cooperation in ensuring global cyber security and combating incoming cyberthreats, which is essential for building a safe ...
Cyber Security shields users' systems | New Gear | PC Retail
Cyber Security aims to keep Mac users safe from all types of web threats, including viruses, worms and spyware, offering them the peace of mind that they can share personal or sensitive data online without the worry of it falling into the wrong ...
PCR: Stream
Don't Be a Victim of a Cyber Attack: International Hacker Puts ...
By Ann Brown
Can you imagine 3.6 million social security numbers stolen? It happened. And such massive personal data theft can only happen via a cyber attack. Late last month, an international hackerillegally obtained tax information from a South ...
Madame Noire | Black Women's...