The Obama administration is floating the idea that the nation’s critical infrastructure operators would more likely adopt voluntary IT security best practices
Author: ISBuzz Team
Please join RANT on Wednesday 28th August for a summer RANT Forum where Darren Hodder will join us to discuss the similarities and challenges between infosec and fraud
Attending BlackHat is something that most security professionals look forward to. It’s an opportunity to meet similar folks on both sides of the security aisle, have a drink, share stories and compare notes.
The need to ensure compliance with regulations should no longer be the primary consideration of CIOs when planning IT risk and security measures.
Facebook users tempted to snoop on their friends’ accounts by hacking into them should really think twice, especially when they come across a site offering such services.
A pro-privacy email service long used by NSA leaker Edward Snowden abruptly shut down today, blaming a secret U.S. court battle it has been fighting for six weeks — one that it seems to be losing so far.
It is not uncommon to see social media accounts, specifically Twitter accounts, directing users to malicious sites such as the ones hosting Android.Opfake, an issue we blogged about last year.
Today on the Windows Developer Show, on which I was a guest, Microsoft’s Bryan Tomlinson announced that the new Windows Phone App Studio had seen usage higher than the company anticipated
Silent Circle, the provider of a range of secure communications services, has pre-emptively closed its Silent Mail email service in order to stop U.S. authorities from spying on its customers.
This summer we’ve seen a number of high profile data breaches, from the IRS leaking 100,000 Social Security numbers to Japan’s government accidentally sharing internal emails with the public through Google Groups.