Real-world cyber city used to train cyber warriors
SANS announced NetWars CyberCity, a small-scale city located close by the New Jersey Turnpike complete with a bank, hospital, water tower, train system, electric power grid, …
SANS announced NetWars CyberCity, a small-scale city located close by the New Jersey Turnpike complete with a bank, hospital, water tower, train system, electric power grid, …
The UK public is growing increasingly concerned about national cyber security, following the number of high profile security incidents and malware discoveries reported this …
A Russian-based hacker has been unmasked as one of the attackers behind a long-standing campaign aimed at compromising computers belonging to Georgian ministries, parliament, …
In its new report, the EU’s ‘cyber-security agency’ ENISA (the European Network and Information Security Agency) examines 85 national and international …
This week, Foreign Secretary William Hague revealed that “not an hour goes by when a system in the UK is not being attacked”, and not only do the hackers attempt …
Following the recent confirmation by a senior intelligence officer with the U.S. Cyber Command that the Pentagon systems and networks are constantly under cyber attacks and …
F-Secure’s new Threat Report uncovers a security landscape in which focus has shifted away from traditional virus and malware threats to nation state sponsored cyber …
Today, extensive analysis on a new cyber espionage weapon dubbed “Gauss’ has been released, stating that the tool has capabilities to attack national critical …
This week we have witnessed a heated debate between US Senators who showed opposite opinions on the Cybersecurity Act of 2012, a bill aimed at regulating a number of important …
The electrical power grid is the backbone on which everything else depends. A cybercriminal could debilitate a major city by a single targeted attack on the energy grid and …
Britain’s security and intelligence agencies have been urged by MPs to engage in cyber attacks against enemy states in a report released by The Intelligence and Security …
Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify APTs, categorize them according to risk level, and prioritize your actions accordingly …