Iowa Caucus 2012: State GOP Worried About Hacker Threat

IOWA CITY, Iowa — Republican Party officials in Iowa are taking new steps to secure their vote counting systems after an anonymous threat suggested computer hackers could attempt to disrupt next month’s presidential nominating caucuses. A video uploaded to YouTube features a computer-generated voice denouncing a corrupt political system and…

read more

How to implement an enterprise threat assessment methodology

Learn how incorporating an assessment of external threats can increase the accuracy and comprehensiveness of risk assessments. <img alt="How to implement an enterprise threat assessment methodology, Blog, threat, Enterprise, methodology, Assessment, implement"height="0" width="0" border="0" style="display:none" src="http://segment-pixel.invitemedia.com/pixel?code=TechBiz &partnerID=167&key=segment”/> View full post on SearchSecurity: Threat Monitor View full post on National Cyber…

read more

Malware re-birth a new threat?

“Recognition of malware is dependent upon an analyst having already analysed the behaviour of the malware and extracted an identifying signature,” Dr Brand said. If the new malware is significantly different to any known malware, antivirus software is unlikely to recognise the threat until the malware has disabled it, say…

read more