By correlating the data, Websense has demonstrated how any attacker intercepting this data can create a precise blueprint of the target’s hardware
Author: ISBuzz Team
McAfee Labs has released its 2014 Predictions Report, analyzing 2013 to forecast the threat landscape for the coming year.
A Brief History of Ciphers – This infographic from CipherCloud starts 1900 BC & covers a brief outline of the history behind Ciphers until 2010.
Following news that Skype social media platforms were hacked by the ‘Syrian Electronic Army’, here are some thoughts and opinions
Syrian Electronic Army (SEA) once again in news held responsible for targeting Skype’s social media accounts.
Russian activists seized the IDs of 54m Turkish citizens, raising already heightened concerns about Ankara’s ability to protect the public’s private data.
The latest buzz in the tech world is around the “Internet of Things,” few people understand what it really means and how their environment will be impacted.
In the second part of a look into IT security, CWJobs.co.uk explores how hackers can be used to organisation’s advantages.
Encryption keys stored by the same CSP that stores your data are easier for government agencies to acquire.
Inexplicably, the IAM market is once again touting SSO with basic provisioning as the Holy Grail.