An Algerian hacker has hijacked the official Facebook account of Syriatel, a major Syrian telecoms company owned by a cousin of President Bashar al-Assad.
Author: ISBuzz Team
We’ve all heard of Flipboard, Pulse and many news readers gaining popularity, especially with the evolution of mobile content curation and the desire to share content within respective social networks by users.
After seeing its popularity decline, Yahoo’s Internet portal in China has formally closed down, in a sign that e-commerce giant Alibaba Group is transitioning away from the brand.
In 2010, I gave a (in retrospect somewhat optimistic) talk at the Catalyst conference in which I described a pull-based architecture for account provisioning.
A survey of 300 information security professionals in Europe finds companies unwilling to make data breaches public
I think I detected a discernible sigh of relief this week from billions of Internet users with 56-character passwords.
Our Post colleagues have had a busy day. First, they released documents revealing the U.S. intelligence budget from National Security Agency (NSA) leaker Edward Snowden. Then they recounted exactly how the hunt for Osama bin Laden went down.
We have a very topical Hacker Hotshot event this Wednesday with Andrew Jaquith (CTO and SVP Cloud Strategy of SilverSky) titled: “4 Email Security Policy Tips That Can Stop Sensitive Information Leakage”.
Information security practitioners know all too well that garnering the support of senior management, can significantly benefit, and advance, their long-term application security objectives for the organization.
Most people reading this article will not remember when these famous words were first broadcast. It was at the end of a speech by Winston Churchill on February, 9th 1941. What he said was this: