Mobile shopping adds even more convenience to online shopping as it can be done while on the go. However there are a number of security concerns which are often overlooked by consumers.
Author: ISBuzz Team
If you’re looking to attack someone who’s not very computer savvy, then phishing is the easiest way to go about it.
Retailers that use technology to try to save shoppers time and money without asking permission first may actually do more harm than help to their bottom line this holiday season.
ESTONIA—This week, NATO kicked off Cyber Coalition 2013, a three-day event organized to test Allies’ response to coordinated network attacks.
Cyber Monday takes place this year on the 2nd of December and marks the biggest online sales day of the year in the UK.
One wireless security risk that’s easy to overlook is the threat from unlicenced transmissions. Unlike wired networks, wireless LANs don’t have singular points through which all traffic flows.
In a new blog post, researchers from Imperva’s Application Defence Centre (ADC) team, take a close look at the recent data breach against Loyaltybuild.
As if 2013 was not exciting enough in the world of cyber security, 2014 will continue to keep us on our toes.
Although federation divides the work between an identity provider (IdP) and a service provider/relying party (SP/RP)
In response to the news that another Bitcoin company has been hacked and $1 million was stolen, Amichai Shulman, CTO of Imperva has the following comments: