If employees are using regular email software and methods of attachments to send sensitive data and client information or transfer large files, an ad hoc file transfer solution can tighten up security
Author: ISBuzz Team
In the previous two installments of this series, we discussed the fiduciary obligation of officers/directors to proactively address cyber security and the legal basis for holding them personally liable if they fail to do so.
Call it insult to injury: Android users are used to being frequent malware targets, but they have other security issues to consider as well.
Google’s Android mobile operating system is so besieged by cyber hackers’ malicious apps that the malware count is on track to hit the million mark by 2014, a new report from cyber analysts Trend Micro warns.
The Center for Automotive Embedded Systems Security (CAESS) conducted a study showing what could happen if a determined hacker went after the computer systems embedded in cars.
It’s been an exceedingly ugly fortnight on Twitter. Following a successful campaign orchestrated by journalist and feminist Caroline Criado-Perez to have a woman reinstated on Bank of England banknotes
Actor Will Smith captured the attention of Defcon attendees when he showed up unexpectedly at the hacker conference on Sunday apparently to do research for an upcoming movie.
When Tor admitted early this week that some nodes on the network had suddenly and inexplicably gone dark, thanks in part to a malware attack, theories abounded as to just what was going on and why.
Sydney Airport – the main international gateway to Australia and the country’s busiest airport – is already claiming progress on its efforts to become a ‘smart airport’
Britain. Home of rolling hills, tea and crumpets, and cacophonies of hooded youths shouting abuse from their streetside benches at elderly passers-by.