• Home
  • Domains
    • Application Security
    • BCP/DR
    • Breaches
    • Cloud Security
    • CISO
    • Cybercrime
    • Data protection
    • Data Privacy
    • Database security
    • DDoS
    • Deception
    • Endpoint security
    • Forensic
    • Hacking
    • GRC
    • Identity and access management (IAM)
    • IoT Security
    • Malware and Vulnerabilities
    • New Cyber Technologies
    • OT Security
    • Penetration Testing
    • Phishing
    • Ransomware
    • Security Architecture
    • Security awareness
    • Strategy and planning
    • Threat Intelligence
    • Web Security
  • InfoSec Deals
  • InfoSec Business Directory
    • List Your InfoSec Company
    • Search InfoSec Companies
  • Security Experts
  • Log In
Menu
  • Home
  • Domains
    • Application Security
    • BCP/DR
    • Breaches
    • Cloud Security
    • CISO
    • Cybercrime
    • Data protection
    • Data Privacy
    • Database security
    • DDoS
    • Deception
    • Endpoint security
    • Forensic
    • Hacking
    • GRC
    • Identity and access management (IAM)
    • IoT Security
    • Malware and Vulnerabilities
    • New Cyber Technologies
    • OT Security
    • Penetration Testing
    • Phishing
    • Ransomware
    • Security Architecture
    • Security awareness
    • Strategy and planning
    • Threat Intelligence
    • Web Security
  • InfoSec Deals
  • InfoSec Business Directory
    • List Your InfoSec Company
    • Search InfoSec Companies
  • Security Experts
  • Log In

Day: July 18, 2013

Meanwhile Back at the EU: Privacy Showdown over Cookies and Opt-in

Andy Green of Varonis shares his thoughts on the latest privacy showdown coming from the EU

Securing Your Work Files Before You Share Them Over The Internet

While you are at the office it is probably easy to share the files that you work on with your fellow employees.

Cybercriminals Empty Dubai Man’s Bank Account After Hacking His Gmail

An email address that’s used for online banking and business purposes can be highly valuable for cybercriminals.

Android Apps That Exploit “Master Key” Bug Found on Google Play

A proof-of-concept exploit for the “master key” vulnerability in Android has already been made public, so it could be only a matter of time until we see some Trojanized apps that leverage the flaw.

Why Crowdstrike’s focus on attackers and active defense polarizes infosec pros

I’ve been writing this story forever it seems, trying to arrive at a reasonable version of the truth. I’ve been sworn to secrecy, and have had so many off-the-record conversations.

Cybersecurity vs. Cyber Security: When, Why and How to Use the Term

cyber security

“Cybersecurity” and “cyber security” are getting more and more mixed usage lately, so much that they are becoming almost as ambiguous as the term “cloud” was a few years back.

Post Liberty Reserve Shutdown – What’s Next?

After Liberty Reserve’s shutdown, small or big–time cybercriminals had to scurry for an alternative currency.

How the App Store turned into software development’s holy grail

When Apple booted discovery app AppGratis from its App Store in April, it was a sharp reminder to iOS developers: don’t mess with Apple’s rankings or suffer the consequences.

We’ve Remotely Spied Through The Webcams Of Chinese Hackers

Remotely taking control of someone’s computer is not an unheard of hacker exploit, but this claim about remotely controlling a Chinese hacker’s webcam is just crazy.

D’OH! Use Tumblr on iPhone or iPad, give your password to the WORLD

Tumblr’s iOS app fails to log users in through a secure (SSL) server, it has emerged.

← older

Information Security Buzz (aka ISBuzz News) is an independent resource that provides the experts comments, analysis and opinion on the latest Information Security news and topics

Twitter Facebook-f Linkedin Youtube

Working With Us

  • About Us
  • Advertise With Us
  • Information Security Companies Directory
  • List Your Company On Information Security Directory (LTD)
  • Search Information Security Companies
  • Contact Us

The Pages

  • Privacy Policy
  • Terms & Conditions
  • RSS Feeds

Our Contributing Experts

  • Information Security Expert Community (1000+)
  • Register as an Expert and Contribute
  • Submit Security Article

Copyright © 2022 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is in Harrison, ACT 2914.