British secret service agencies ready #cybersecurity strike force against extremist hackers – an annotated infographic

Britain is building a cyber-offensive strike force to stop jihadi hackers and hostile powers mounting deadly attacks on the UK’s critical infrastructure, e.g. hospitals, power networks and air traffic control systems. Click on the graphic for an expanded view. Continue reading British secret service agencies ready #cybersecurity strike force against extremist hackers – an annotated infographic

Book Review: @War: The Rise of Cyber Warfare – Shane Harris

By Jade Fell “The separation between the cyber and the physical worlds was disappearing. Cyberbullying was just bullying, and cyberwar was just war – the true age of cyber began when we started removing it as a descriptor.” ― Matthew Mather In April 2009 Chinese military hackers intercepted the Pentagon’s cyber security systems and gained access to huge amounts of information on the US Defense Department’s costliest weapons programme ever, plans for the United States military’s most sophisticated fighter jet yet – the $327 billion Joint Strike Fighter Project. Known as the F-35, the jet was the most complex military … Continue reading Book Review: @War: The Rise of Cyber Warfare – Shane Harris

E&T writer wins Best Overall Feature Article of the Year at BT Security Journalism Awards 2013. Woo hoo!

Congratulations are due to E&T assistant features editor Aasha Bodhani, who last night won the Best Overall Feature Article of the Year award at the BT Security Journalism Awards 2013. Her winning article was “Ethical hacking: bad in a good way“, which discussed the question of how as more and more organisations are targeted in cyber-attacks, they must get to know their enemy if they are to protect vital networks. Enter the professional, ethical hacker. Aasha is now the proud owner of a very heavy laser-etched glass globe, with matching display plinth, presented in a blue silk-lined box. It’s a … Continue reading E&T writer wins Best Overall Feature Article of the Year at BT Security Journalism Awards 2013. Woo hoo!

Woooooo!! Halloween hacking horror stories – a spookily annotated infographic

On this night of ghastly ghouls and malodorous spirits, we share with you this Hallowe’en themed hacking, ID theft and device infection infographic. Make sure you’re not haunted by this personal security nightmare. Click on the graphic for an expanded view.   Continue reading Woooooo!! Halloween hacking horror stories – a spookily annotated infographic

New issue of #EandT magazine online now – ID theft, digital healthcare, smart gadgets, cyber-espionage

It’s National Identify Theft Prevention Month and in the latest issue of E&T magazine, now available online, we look at the identity theft explosion that leaves people, companies and entire nations wide open. We have some great features around this theme, including how to keep your digital identity safe; the digital future of healthcare; eavesdropping security agencies; smart gadgets creating opportunities for hackers to entre your virtual home and other such disturbing scenarios. We also have an exclusive podcast interview with a cyber-security expert about the latest developments in cyber-espionage. Don’t have nightmares, do sleep well. If cyber-crime is your … Continue reading New issue of #EandT magazine online now – ID theft, digital healthcare, smart gadgets, cyber-espionage

Israel and Hamas ceasefire ends cyber warfare – an annotated graphic

With last night’s welcome announcement that Israel and Hamas have declared a ceasefire, today’s infographic has been rendered mercifully redundant. It now stands merely as a record of the level of cyber warfare that took place between the two warring factions and also serves as an instructive portrayal of the kind of virtual mayhem that it is now perfectly possible to wage online. When Q says to Bond in Skyfall that he can wreak more havoc sitting in his pyjamas before breakfast than Bond can in a month, he’s not joking. Brave new world, indeed, as Bond replies. Click on … Continue reading Israel and Hamas ceasefire ends cyber warfare – an annotated graphic

TDSS: the malignant ‘heart’ of cyber crime

Antivirus champion Kaspersky Lab describes the TDSS malware as the ‘most powerful and complex rootkit to date’. It infects drivers, which ensures that it will be launched almost immediately the operating system is started. Consequently, it is extremely difficult to detect and remove this rootkit. TDSS is spread via an affiliate program: affiliates earn money according to the number of computers they infect; the highest payment is made for machines located in the US. Botnets managed using TDSS, and consisting of approx. 20,000 infected machines, are sold on the black market. The botnets’ command and control centers are located in … Continue reading TDSS: the malignant ‘heart’ of cyber crime