China, in pursuit of its territorial claims in the resource-rich South China Sea, is resorting to low-level cyber warfare against the Philippines and Vietnam — the two nations who recently won an international legal case against the Communist government.  Reports in local media and by regional cybersecurity companies have attributed a rash of cyber vandalism attacks in the past […]

by

A national cyber security corps of volunteers with experience in the area is needed to help fight major online threats to governments, private industry and civil institutions, a Canberra academic has urged. Professor Greg Austin from the Australian Centre for Cyber Security at UNSW Canberra proposed the new “cyber security reserve” in a discussion brief […]

by

Whenever Jennifer Edwards posts new content, you’ll get an email delivered to your inbox with a link. Email notifications are only sent once a day, and only if there are new matching items. … read more at: http://www.timesdaily.com/news/education/northwest-shoals-starts-cyber-security-degree-program/article_c857bce2-c3f0-5e71-990f-5d89a6a7e417.html

by

When it comes to computer security, there’s no silver bullet. There’s no way to be certain that a system can never be hacked. In fact, at current rates of growth anyone born today will – at some point by the age of 30 – have been hacked, scammed, had their identify stolen, or their smartphone […]

by

Cybersecurity readiness objectives 1. Cybersecurity plan: To achieve any goal or objective, a plan that provides guidance toward those goals and objectives is essential. Cybersecurity is no different than any other kind of endeavor in that regard. In this context, cybersecurity readiness is the overarching goal and a cybersecurity plan is the first of several […]

by

Symantec discovered a former unknown group of cyberespionage, which select its targets in a way that it is believed to have only compromised 7 organisations along with 36 endpoints from the time when it started working 5 years back. Symantec has named it as “Strider”, the threat actor’s malware of choice is a customized, Windows […]

by

The discovery of arms cache at a Cape Town cemetery is cause for grave concern. Granted, South Africa is known more for its high violent crime rate than scenic views such as Table Mountain. However, what is disconcerting is the proliferation of these violent crimes and weapons into neighbouring countries such as Zimbabwe. Previously, dynamite and […]

by

Whenever Jennifer Edwards posts new content, you’ll get an email delivered to your inbox with a link. Email notifications are only sent once a day, and only if there are new matching items. … read more at: http://www.timesdaily.com/news/education/northwest-shoals-starts-cyber-security-degree-program/article_c857bce2-c3f0-5e71-990f-5d89a6a7e417.html

by