EU Launches Permanent Computer Emergency Response Team

The group is comprised of IT security professionals from institutions including the European Commission, the General Secretariat of the Council, the European Parliament, and the European Network and Information Security Agency.

How One University Enhanced Cybersecurity

West Virginia University is strengthening its Web application security with a solution from IBM.

Continuity Program Buy-in

Those charged with continuity planning can get support from senior management by developing metrics and demonstrating value to the bottom line.

Second Sony Hacker Arrested

A second member of the hacking group LulzSec has been arrested for a 2011 intrusion of Sony Pictures’ computer systems.

Google Algorithm Tweak to Punish Pirates

Starting this week, Google may begin lowering the rank of Web sites appearing in its search results when the sites appear to be violating copyright laws.

Ransomware Holds Computers Hostage, Demands Payment

Hackers are using a virus that disguises itself as a message from the FBI to extort money from computer users. The FBI is calling it “ransomware.”

Morning Security Brief: FBI Tattoo Database, West Nile Epidemic, Kaspersky Lab Discovers Gauss, and More

The FBI biometric program is building a bigger tattoo database. State of Emergency declared for West Nile epidemic. Gauss wreaks havoc in Lebanese banks. And more.

Phishing E-mails Spoof Payroll Services

In recent weeks, fraudulent e-mails purporting to be from payroll companies have aimed to lure recipients into downloading data-stealing malware onto their computers.

Study Highlights Infrastructure Risks

A biennial report that looks at how well various industries manage risk and guard against cyberattacks has found that critical infrastructure, including the energy and utilities sectors, is among the lowest ranked of the group.

Network Monitoring Could Help Detect State-Sponsored Cyberattacks

It is impossible to stop all attacks, but network monitoring can help make detection faster, experts say.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.