Global conflicts have increasingly led tech-savvy protesters and loyalists to express their views online by hacking, and while many groups have focused on attempting to damage or deface government websites
Author: ISBuzz Team
It only took one attack last week, but it was enough to allow the Syrian Electronic Army (SEA) to compromise The Washington Post, CNN and Time.
Canada’s Prime Minister Stephen Harper once called BlackBerry as a “crown jewel” to the country.
An external review of Bloomberg’s data policies and procedures has recommended stronger measures be put in place in order to ensure journalists are unable to view client information through its financial data terminals.
Gaming Companies, and especially those who provide a cloud service for either online play or account management are a great and very compelling target for attackers.
The key to improving a web security program is having a comprehensive metrics program in place – a system capable of performing ongoing measurement of the security posture of production systems, exactly where the proverbial rubber meets the road.
A new FireEye report highlights the resurgence of Poison Ivy, a malware Remote Access Tool (RAT) that has remained popular and effective eight years after its original release – attacking dozens of Fortune 1000 firms.
Cyber attack or disruption could cause the next systemic shock to the UK banking industry rather than a liquidity crunch, according to the latest report from business consultancy firm KPMG.
Mauritania Attacker leaked thousand of twitter Accounts credentials today, which was hijacked from twitter.
Unix, the core server operating system in enterprise networks for decades, now finds itself in a slow, inexorable decline.