Please turn on your JavaScript for this page to function normally.
Cyberwarfare and the developing digital arms race

According to security expert Mikko Hypp?¶nen, we might not be in a cyber war but we are in a cyber arms race, and the governments involved are the James Bond of the …

Five priority areas for future U.S. homeland security focus

On the heels of the tenth anniversary of the creation of the U.S. Department of Homeland Security (DHS), Booz Allen Hamilton outlined five priority areas for the next decade …

Real-world cyber city used to train cyber warriors

SANS announced NetWars CyberCity, a small-scale city located close by the New Jersey Turnpike complete with a bank, hospital, water tower, train system, electric power grid, …

Cyber-tension between nations fuels public desire for action

The UK public is growing increasingly concerned about national cyber security, following the number of high profile security incidents and malware discoveries reported this …

Georgia shows photos of Russian-based hacker spy

A Russian-based hacker has been unmasked as one of the attackers behind a long-standing campaign aimed at compromising computers belonging to Georgian ministries, parliament, …

The anatomy of cyber security exercises

In its new report, the EU’s ‘cyber-security agency’ ENISA (the European Network and Information Security Agency) examines 85 national and international …

Britain is targeted by cyber attacks every hour

This week, Foreign Secretary William Hague revealed that “not an hour goes by when a system in the UK is not being attacked”, and not only do the hackers attempt …

White House Military Office breached by Chinese hackers

Following the recent confirmation by a senior intelligence officer with the U.S. Cyber Command that the Pentagon systems and networks are constantly under cyber attacks and …

The cyber warfare revolution

F-Secure’s new Threat Report uncovers a security landscape in which focus has shifted away from traditional virus and malware threats to nation state sponsored cyber …

Stuxnet cousin able to attack industrial control systems

Today, extensive analysis on a new cyber espionage weapon dubbed “Gauss’ has been released, stating that the tool has capabilities to attack national critical …

What’s going on with the Cybersecurity Act of 2012?

This week we have witnessed a heated debate between US Senators who showed opposite opinions on the Cybersecurity Act of 2012, a bill aimed at regulating a number of important …

Energy grids are prime attack targets

The electrical power grid is the backbone on which everything else depends. A cybercriminal could debilitate a major city by a single targeted attack on the energy grid and …

Don't miss

Cybersecurity news