In September, Serbia’s city of Novi Sad hosted the first-ever official hacker conference in the Balkans, BalCCon: First Congress (First Contact).
Author: ISBuzz Team
Google took down a record-breaking 5.3 million allegedly infringing links from its search engine in the last week of September, equivalent to just under nine links every second.
If you’re anything like me and like to keep up on the industry, you’ve no doubt been overloaded with news on the apparently epic Adobe hack. As some of you may no doubt point out I’m no apologist for companies who fail to take security seriously
The U.S. National Security Agency has repeatedly tried to compromise Tor, the government-funded online anonymity tool, but has had little success, according to a new report in the U.K.’s Guardian.
Phablets are fabulous. But they’re awfully large objects to be constantly pulling out of purses, backpacks and pockets. As we embrace giant smartphones for their big, beautiful screens
When companies relied on the static analysis of binaries to determine whether a program is malicious, attackers came up with a simple way to bypass defenses: obfuscating the code with packers and other techniques.
We all had a lot of fun making the trilogy of “Meet John Powers” videos earlier this summer, as did the cast and crew from Twist & Shout who produced the series.
According to a new IDC survey of 1,200 line of business executives, 61% of enterprise technology projects are now funded by the business rather than the IT department
There is a never ending stream of vulnerabilities in the mechanical and cyber systems that support the grid. So, why hasn’t there been any significant breach of the grid?
London, UK (7 October 2013) – According to DOSarrest Internet Security, findings by its Vulnerability Testing and Optimisation service (VTO) of deep website scans, ninety percent of websites are vulnerable to attack.