A few months ago we started tracking a botnet (arbitrarily named LazyAlienBikers) whose origins we did not know and whose malware was undetected.
Author: ISBuzz Team
The certification of a mobile-security sandboxing platform from Good Technology to EAL4+ standards will pave the way for the use of application-isolation techniques to secure mobile and bring your own device
No gasps were heard wafting up from the audience at Tech Crunch Disrupt as Yahoo CEO Marissa Mayer admitted that she doesn’t use a passcode to protect her smartphone, but there should have been.
Let’s say you’ve just had a pen test or security scan performed on your application. You review the list of findings and get to work on remediation.
A JOB combating threats from cyberspace could be the ultimate prize for the winners of an online challenge posed by GCHQ to recruit the most skilled mathematicians, code breakers and ethical hackers in the UK.
With yesterday’s announcement by Apple of the new iPhone 5S, featuring Touch ID, their embedded fingerprint sensor, we are seeing an important change in the modern authentication landscape.
Another shoe has dropped in the National Security Agency’s covert mass surveillance program.
PRISM, XKeyscore, and plenty more classified information about the National Security Agency’s vast surveillance program has been dragged into the light since Edward Snowden began his leaks in May.
Last month’s cyber security report by Kent University offered a startling insight into the challenges faced in combating escalating cyber threats.
Last Tuesday, the first class of my senior year was “Introduction to Computer Security,” a class about the ideas and techniques involved in protecting computers and other digital systems from intrusions and misuse.