Feeds

City IT workers brace for anarchist attack

G20 protest threatens critical systems

Reducing security risks from open source software

IT workers at City institutions have been told they must come to work on April 1 and 2, when thousands of protestors are expected in the Square Mile to mark the G20 meeting of leaders in London.

Authorities fear the protests will turn violent, and many City workers have been ordered to stay at home. But staff maintaining the critical infrastructure behind the London Stock Exchange (LSE) have been told they must come to work.

Earlier this week, the LSE IT department received a request from police to organise an email alert to staff working in two buildings deemed vulnerable to protestors, sources said. The email told LSE IT and other staff who are expected to come to work to dress casually rather than in their usual suit, to avoid identifying themselves as a target for anti-banking activists.

One LSE staffer said: "It's going to be crazy - they'll be right outside our door."

A specific attack on the LSE has been organised on activist site Indymedia UK. "Disrupt the traders whose financial egomania perpetuates global injustice: let's shutdown trading for the day. Meet outside the London Stock Exchange," the call to action says.

According to our insider, backroom workers at the LSE fear being targeted as traders, but none plan to stay away.

Police will deploy thousands of extra officers in the City in response to the protests. The G20 leaders are meeting in London to discuss the global recession triggered by irresponsible lending and debt trading by bankers. ®

Reducing security risks from open source software

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
Microsoft: We're making ONE TRUE WINDOWS to rule us all
Enterprise, Windows still power firm's shaky money-maker
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.