Computer scientists say they found a way to sneak malicious programs into Apple’s exclusive app store without being detected by the mandatory review process that’s supposed to automatically flag such apps.
Author: ISBuzz Team
Bitcoin issues have been front-page news in recent months, especially after its surprising April exchange rate.
As Gartner argues that the boards should be listening more to the CISO for advice, rather than treating them as the defender of the business
A large number of end-user computers are mobile devices and the lion’s share of those are smartphones. APTs are increasingly targeting the mobile market.
Cops: they protect our street, fight crime and defend the law. But in many cases they are now becoming active participants in America’s already established surveillance state.
I’m fresh off of a couple of weeks of getting new data and new perspectives from “herds” of security people by spending time hanging around their watering holes.
One of the things I’ve always loved about Security B-Sides is that it offers a nurturing environment for people who are young in their InfoSec careers. An example of that is playing out this week in Las Vegas.
Despite it being nearly impossible to avoid news about malware, cyber-espionage and other cybersecurity woes,
Facebook “likes” and the number of Twitter followers a company has are a very real commodity, so it’s no wonder that someone has been enterprising enough to now sell that commodity in a new Zeus-based fraud scheme.
A number of IT security skills certifications requiring candidates to pass exams have sharply gained in terms of demand and pay value, according to a new Foote Partners report.