EMEA Information Security Channel Group

 View Only

Information Security News 

Mar 02, 2015 05:17 AM

Today’s Information Security News (#IS_News) includes: Ramnit, internet stalking & the cost of a breach

Tweet of the Day
Did you catch our blog on the latest law enforcement operation against Ramnit? Read the full post here: http://bit.ly/1wcGVsk #SymcSecurity


Global News  
TechWeek EuropeeWeekChina TopixComputing [UK], Top Tech News, and other sources continued to report on the Europol operation to halt the Ramnit botnet crime ring and highlighted Symantec’s involvement in the take down. [2/26/15 – 2/27/15]

Security News

The Guardian Spyware and malware availability sparks surge in internet stalking. Domestic violence experts have warned that the use of specialist technology that enables abusers to stalk victims online and via mobile phones is growing at an alarming rate.

Computer Weekly Target breach could cost $1bn or more, say security experts. Security experts say the data breach at US retailer Target in late 2013 could cost way more than the $162m cost declared in the company in the company’s annual financial report.

Financial Times Technology groups need to get serious about their security. Big corporate technology hubs make natural targets for all kinds of attackers, from profit driven thieves and mobsters to politically-motivated activists — who might once have sought publicity by chaining themselves to a company’s front door.

IT Pro Portal US identifies cyber attack as biggest national threat
Forget school shootings, bomb threats, planes flying into buildings, tsunamis and hurricanes – cyber attacks are the biggest threat to the US. National intelligence director James Clapper says attacks by politically and criminally motivated actors are the biggest threat to US national security.


Mobile News

SC Magazine How do you solve a problem like mobile security?

Mobile security has been a major issue in IT security departments ever since the world went on a shift from BlackBerry to iPhone and, as a result, the IT deployment model changed from ‘push' to ‘pull'. End-users, it turned out, had decided they wanted to use their own devices at work.

Brought to you by the Information Security Channel Community. Join the community to join the conversation

ISCCbanner_0.png

Statistics
0 Favorited
0 Views
0 Files
0 Shares
0 Downloads

Tags and Keywords

Related Entries and Links

No Related Resource entered.