It is not uncommon to see social media accounts, specifically Twitter accounts, directing users to malicious sites such as the ones hosting Android.Opfake, an issue we blogged about last year.
Author: ISBuzz Team
Today on the Windows Developer Show, on which I was a guest, Microsoft’s Bryan Tomlinson announced that the new Windows Phone App Studio had seen usage higher than the company anticipated
Silent Circle, the provider of a range of secure communications services, has pre-emptively closed its Silent Mail email service in order to stop U.S. authorities from spying on its customers.
This summer we’ve seen a number of high profile data breaches, from the IRS leaking 100,000 Social Security numbers to Japan’s government accidentally sharing internal emails with the public through Google Groups.
If employees are using regular email software and methods of attachments to send sensitive data and client information or transfer large files, an ad hoc file transfer solution can tighten up security
In the previous two installments of this series, we discussed the fiduciary obligation of officers/directors to proactively address cyber security and the legal basis for holding them personally liable if they fail to do so.
Call it insult to injury: Android users are used to being frequent malware targets, but they have other security issues to consider as well.
Google’s Android mobile operating system is so besieged by cyber hackers’ malicious apps that the malware count is on track to hit the million mark by 2014, a new report from cyber analysts Trend Micro warns.
The Center for Automotive Embedded Systems Security (CAESS) conducted a study showing what could happen if a determined hacker went after the computer systems embedded in cars.
It’s been an exceedingly ugly fortnight on Twitter. Following a successful campaign orchestrated by journalist and feminist Caroline Criado-Perez to have a woman reinstated on Bank of England banknotes