Zeus Trojan targets UK government
During his speech at the Munich Security Conference on Friday, UK’s foreign secretary William Hague revealed that the UK government has been targeted with a e-mail …
Worrying increase in surveillance across Europe
A landmark EU-wide study of national privacy safeguards shows a decline in privacy protection across Europe and a steep increase in state surveillance over the lives of …
Decisive factors for designing resilient networks
The resilience of data networks is vital for the economy and society. Yet, abnormal but legitimate traffic, malicious attacks, accidents or human mistakes, and technical …
Data breach notifications in Europe
Recent high profile incidents of personal data loss in Europe have prompted wide discussion about the level of security applied to personal information shared, processed, …
Data protection compliance in the EU administration
The European Data Protection Supervisor (EDPS) adopted a policy paper that sets out the framework within which he monitors, measures and ensures data protection compliance in …
EU investigates Google antitrust violations
The European Commission has decided to open an antitrust investigation into allegations that Google has abused a dominant position in online search, in violation of European …
Interim findings of first EU cyber exercise
The interim findings and recommendations of EU Member States participants of the 1st Pan-European Cyber Security Exercise indicate that Cyber Europe 2010 was a useful cyber …
First EU cyber security exercise successfully concluded
The first ever, pan-European cyber security exercise “Cyber Europe 2010” ended successfully yesterday. More than 150 experts from 70 public bodies around Europe …
Experts run large cyber attack simulation exercise
Europe’s cyber security experts are testing their responses today in the first ever pan-European cyber-attack simulation exercise. In “Cyber Europe 2010“, …
Featured news
Sponsored
Don't miss
- How RansomHub went from zero to 210 victims in six months
- Sinon: Open-source automatic generative burn-in for Windows deception hosts
- Midnight Blizzard delivered iOS, Chrome exploits via compromised government websites
- The NIS2 Directive: How far does it reach?
- Pioneer Kitten: Iranian hackers partnering with ransomware affiliates