It may be possible for a “single dedicated attacker” to run an internet “carpet-bombing” attack by applying Big Data and distributed computing technologies, security researcher Alejandro Caceres warns.
Author: ISBuzz Team
Last week, FBI raids on Freedom Hosting and child porn distributors took down Tor Mail, a secure email provider for users of the Tor network.
The “Comment Crew,” a group of China-based hackers whose outing earlier this year in major media outlets caused a row with the U.S., have resumed their attacks against dissidents.
A Cryptzone security survey undertaken amongst SharePoint practitioners at the Microsoft conference in Las Vegas, reveals how many organizations have inadequate security and governance measures
This year, cloud computing is definitely poised to gain importance among enterprises.
The Snowden incident where, according to the New York Times (21Jun2013), a government intelligence worker was able to easily copy and disseminate large amounts of highly sensitive and classified data
DOSarrest Internet Security announced today that it will begin offering a website Vulnerability Testing and Optimization (VTO) service.
Information security has always required specialised knowledge – not least to decipher all the acronyms and geek speak!
I have spent the last 18 months pondering on the whole sphere of identity and authentication and a number of things have happened:
Cybercriminals will unleash a wave of “zero-day” vulnerabilities to attack Windows XP machines after April 8, 2014, a security expert has claimed. Microsoft will stop releasing security updates for the OS on that date.