The Syrian Electronic Army has been up to its old tricks again, this time claiming to have infiltrated president Barack Obama’s official Twitter and Facebook accounts, and re-election web site.
Author: ISBuzz Team
A few years back Google got into fearful trouble by recording the location of WiFi transceivers without asking for their owners’ permission.
The Internet Archive, the online repository of millions of digitized books, wants to shield its readers from other’s prying eyes — like the government’s.
The discrepancy, or gap, between doing and achieving is a persistent problem in business. Although every experienced leader knows that functional success
It’s fascinating how the mobile industry is shaping every single interaction we have with our friends, family and even colleagues and clients at work.
The Nexus of Forces is transforming the approach towards information security as new requirements are brought about by social, mobile, cloud and information.
Taiwan’s Fair Trade Commission this week fined Korean conglomerate Samsung $340,000 for “astroturfing.”
Buffer, a social media app, allows its users to schedule and automatically post updates to social media sites such as Facebook and Twitter.
Professional networking giant LinkedIn is the subject of much criticism for its new LinkedIn Intro offering for lapses in privacy and security, and is being described as the equivalent to a Man-in-the-Middle (MitM) attack.
In recent months, I’ve started to take my own digital security much more seriously. I encrypt my e-mail when possible, I’ve moved away from Gmail, and I’ve become much more vigilant about using a VPN nearly all the time.