We’ve covered a great deal of the major data breaches experienced by enterprises over the last decade or so—Sony, the South Korean government, Nvidia, Honda—but there’s nothing quite like looking at them together, visualized.
Author: ISBuzz Team
Morphing existing IT security policies to accommodate for bring your own device (BYOD) is the wrong way to address BYOD, according to IBM Institute for Advanced Security director, Glen Gooding.
White House Employees fell victim to the Syrian electronic Army’s Social Engineering attack – Their personal email accounts have been hijacked by Syrian Electronic Army.
FireHost announced its latest web application attack statistics, which track the prevalence of four distinct types of cyberattacks that pose the most serious threat to businesses.
Sharing on social media helps hackers sharpen “spear phishing” attacks they use to trick their way into computers, security experts said Monday.
“Defense in depth,” or the layering of multiple security products is a commonly employed security strategy and best practice.
Growth in external hacking attempts, DDoS and malware attacks, and internal threats to data are the key security concerns for UK businesses.
Researchers at Securi discover Credit Card Redirection attack technique to hijack credit card data during transactions on e-commerce sites.
The House today narrowly defeated an amendment to a defense spending package that would have repealed authorization for the National Security Agency’s dragnet collection of phone-call metadata in the United States.
Turkish security researcher Ibrahim Balic now claims he was behind the attack Apple admitted to in a statement to its developer network last Thursday, July 18, saying that sensitive personal information of some 275,000 members may have been compromised.