In the security industry, we pride ourselves on having some of the best minds in technology, with cutting edge gear and techniques always on display.
Author: ISBuzz Team
Beginning in early May, Cisco TRAC has observed a number of malicious redirects that appear to be part of a watering-hole style attack targeting the Energy & Oil sector.
Forget the debate around the security or insecurity of the iPhone 5s’s fingerprint reader. The latest version of the iPhone’s operating system currently offers a gaping hole in its old-fashioned passcode lockscreen.
Officials from RSA Security are advising customers of the company’s BSAFE toolkit and Data Protection Manager to stop using a crucial cryptography component in the products
More than three months after Edward Snowden revealed details of NSA secret surveillance activities, intelligence officials are still assessing the fallout from the former contractor’s disclosures. But they already know how the leaks happened.
The gold iPhone 5s (which still seems more “champagne” to me) was a phone that seemed improbable when it was first rumored, but Apple did indeed make it
A gang has been arrested on suspicion of hijacking the computer system in a Barclays bank to siphon off £1.3million.
While phishing, reconnaissance scans, social engineering, and other opportunistic attacks still comprise the lion’s share of malicious activity seen by most companies, a growing proportion of attacks are able to evade signature-based defenses.
Documents leaked by NSA whistleblower Edward Snowden show that the United Kingdom’s Government Communications Headquarters (GCHQ) is responsible for the hack attack on Belgacom, Belgium’s largest telecommunications company.
Companies are under immense pressure to improve cybersecurity performance by focusing on compliance and risk management initiatives.