GCI

Cyber attackers hit Westminster forcing security chiefs to shut down access to MP’s emails

A CYBER attack has been launched on Westminster forcing security chiefs to shut down email systems. Officials confirmed hackers had targeted Parliament so they took the action earlier today. A Parliamentary Spokesman told the Sun Online: “The Houses of Parliament have discovered unauthorised attempts to access parliamentary user accounts. “We are continuing to investigate this […]
EU gets tough on cyber security
Cyber security, IM to top agenda of police chiefs’ meet
Forcing Clinton’s Emails Into the Open
Forcing Clinton’s Emails Into the Open Why we’re suing to make the government do what it seems disinclined to do: get to the bottom of this murky matter.
Sony Hack Shines Light on North Korea’s Cyber Attackers
Sony Hack Shines Light on North Korea’s Cyber Attackers Blamed by the U.S. for the Sony hack, North Korea selects some of its brightest talent for its cyberwarfare program as its conventional forces age, defectors and experts say.
Prosecutors in Switzerland Get Access to FIFA Emails
Swiss Prosecutors Get Access to FIFA Emails Prosecutors in Switzerland have been given access to the emails of FIFA’s suspended secretary-general Jéròme Valcke, part of the widening investigation into potential corruption at soccer’s global governing body.
Parties Fight Over Access to Benghazi Emails
Parties Fight Over Benghazi Emails The White House dug in for a protracted fight with Republicans over the release of internal Obama administration emails related to last year's terror attack in Benghazi, Libya.
Cyber attackers target secret research projects at British universities: report
How do you send an mp3 to a cell phone when you have a Motorola C261 with Tracfone service which has web access but cannot receive emails and does not have a data cable?
Does HIPAA allow access to medical records by corporate security?
What are Two ways to enhance the security surrounding the use of remote access?
Why do i have to read emails or documents 4 to 5 times to get what they say please help there's a person who is working as a doctor he usually gets emails on pharma medication new tech?
You forget your qmobile e5 security code so how can you access your code?
[19-09] Breaking :#Hotmail down: #Outlook users unable to access emails
[09-08] #UK mulls new fines for lax cyber-security measures
[17-08] #UK workers interested in cyber security, survey shows
[07-08] #UK intelligence agencies turn to start-ups on cyber security
[19-09] Microsoft's #Hotmail and #Outlook down: Users across Europe unable to access emails for over 12 hours
[11-08] #Kaspersky never certified by #UK's National Cyber Security Centre #CyberSecurity
[07-08] #UK Government issues cyber security guidelines for driverless cars
[19-07] I'll be giving a keynote on health and cyber security on 4 October 2017 at
[24-08] Are you prepared? #Cyber Security, a hidden war @computermuseum #cambridge #citrix
[15-07] US cyber security specialist expands in Edinburgh to s.. #DenialofserviceAttack #Scotland #UniversityOfEdinburgh
[06-08] Experienced Telesales Executive - Cyber Security #London #jobs Apply Now at
[26-07] #Job #vacancy: We're looking for a Development Manager, for Cyber Security Challenge UK in #Scotland. Find out more: ht
[17-08] Ongoing Holyrood cyber attack fails to breach security #Scotland #CyberSecurity
[10-07] @TheScotsman #Edinburgh tops the league for Cyber Security companies #infographic #scottishbusiness
[19-07] #US cyber security software specialist @Corero to double its #Edinburgh-based workforce
[19-09] At #MSPartnerDays Day 1 listening to @clarecur & @pbolt discuss market opportunity, GDPR & cyber security. Will be an ex
[07-08] I will be giving a keynote at 1st Int Conf on Advances in Information, Web & Cyber Security AIWCS 2018 #glasgow ...
* Islamist terrorism is a “generational problem” that will remain a threat for another 20 or 30 years, according to a former head of MI5. Jonathan Evans said the Westminster terror attack in March may have had an energising effect on extremists. He told the BBC’s Today programme: “We’re at least 20 years into this, my guess is that we will still be dealing with the long tail in another 20 years time – I think this is genuinely a generational problem. Video:June: Rudd: UK in new phase of global terrorism “I think that we are going to be facing 20 or 30 years of terrorist threats and therefore we need absolutely critically to persevere.” Lord Evans, who retired from the Security Service in 2013, said the 7/7 bombings in July 2005 triggered an “energising effect on the extremist networks in the UK”, and thought there would be a similar feeling in the wake of the Westminster atrocity. “We did see a huge upsurge in threat intelligence after 7 July and I suspect that there’s the same sort of feeling in the period after the Westminster Bridge attack – that a lot of people who thought ‘I’d like to do this’ suddenly decided ‘yep, if they can do it, then I can do it’,” he said. Video:June: May: Tough conversations required over terrorism Since Khalid Masood’s rampage, there have been attacks in Manchester, London Bridge and Finsbury Park. But Lord Evans said he did not think the security services were “losing the race” despite the recent spate of attacks. “I don’t think we are losing the race; I think that it is a race and we have to keep moving forward rapidly unless we are going to slip back,” he said. Video:June: Met Commissioner: We face a ‘changing threat’ “There will be some capabilities that do get eroded and I think the widespread use of encryption has reduced the ability of the agencies and the police to access the content of materials.” In the wake of the attacks there have been calls for a weakening of the encryption on messaging platforms, but Lord Evans said he did not think this was the answer because “there is a parallel issue which is cyber security more broadly”. “I think the way in which cyberspace is being used by criminals and by governments is a potential threat to the UK’s interests more widely and it’s very important that we should be seen and be a country in which people can operate securely – I think that’s very important for our commercial interests as well as for our national security interests.” Lord Evans said he was “rather surprised” that terrorists had not used a dirty bomb to attack the UK as “it seems such a clear opportunity”. Source link Islamist terror threat ‘will remain for decades’ says former MI5 head was originally published on News London
* New fines for essential service operators with poor cyber security
* Cyber security chief who worked on London Olympics joins PwC
  • [19-09] Breaking :#Hotmail down: #Outlook users unable to access emails
    ques
    What does "cyber-" actually mean?
    I'm heading into the postgraduate phase of my Computer Science-oriented studies, and I can't put my finger on what this root means. According to Etymology Online it comes from Cybernetics, which in turn comes from the greek for "Helmsman" and is the study of governation or governing systems. But modern usage, such as cyberspace, cybercafe, cyberattack, cyberterrorism, cybermosque, cybersex, cyberbullying, and such seem to use it synonymously with "Internet" Of course, you could argue that you use a cybercafe to interact with a primitive virtual governor, a cyberspace is a place where a lot of virtual governors "reside", while cyberattacks try to disrupt these governors. But cyberbullying and "cybering" really don't fit into that scheme, unless you were to day that cyberbullying is "bullying by relaying domineering or intimidating messages with the help of a governor." but then again "physics" could be a governor. You shout mean things into the air and physics makes sure your overbearing soundwaves propagate to your target. Bo that would mean that pretty much everything is cyber-, because everything is controlled by something. The rational middle ground would be for "cyber-" to now mean "internet," unless it is followed by a greek or latin root, in which case it would mean "control systems" Is it safe to assume this?
    Westminster
    attackers
    security
    sen
    “CHIEFS, CHIEFS, CHIEFS, CHIEFS,” rang out throughout the gym as it spread from one family to the next.
    The quicker the country builds up the civilian institutional capacity it needs for long-term cyber security, the better.
    the importance of computer security to prevent hackers from gaining access.
    Cyber attackers hit Westminster forcing security chiefs to shut down access to MP’s emails
    A CYBER attack has been launched on Westminster forcing security chiefs to shut down email systems. Officials confirmed hackers had targeted Parliament so they took the action earlier today. A Parliamentary Spokesman told the Sun Online: “The Houses of Parliament have discovered unauthorised attempts to access parliamentary user accounts. “We are continuing to investigate this […]
    In 2001 the NHS entered into a licensing deal with Microsoft, ignoring the advice of some of its own IT specialists that had recommended investing in Linux instead. Concerns about the vulnerability of NHS computer systems to cyber-attack have been expressed since at least 2016. NHS computer systems have been subject to cyber attacks of which one in May 2017 was notable. NHS computers have been vulnerable because a minority still use or used Windows XP, an outdated system that originated in 2001, and one which Microsoft stopped supporting with security patches. Complacency among NHS staff and among government departments that pay for computer security are blamed. Unless systems are upgraded, more cyber attacks are feared. Dr David Wrigley of the British Medical Association said, “It’s been known about for years, that the software isn’t up to date across the NHS, so it’s not unpredictable that this situation should have arisen. But it’s disappointing that funding hasn’t been given to upgrade the system. It needs urgent action by politicians.”

    I like to think of the first problem--getting on to the Internet--by remembering what it was like using an "alternative" long distance service before the breakup of the Bell monopoly. People who used the alternative carriers had to dial all sorts of access codes--very often a local access number, a credit card number, a security code, *and* the number of the party they were calling. They knew that whatever came after that was going to be easier.
    Forums