When Apple booted discovery app AppGratis from its App Store in April, it was a sharp reminder to iOS developers: don’t mess with Apple’s rankings or suffer the consequences.
Author: ISBuzz Team
Remotely taking control of someone’s computer is not an unheard of hacker exploit, but this claim about remotely controlling a Chinese hacker’s webcam is just crazy.
Tumblr’s iOS app fails to log users in through a secure (SSL) server, it has emerged.
On the tiny Mediterranean island of Malta, two Italian hackers have been searching for bugs—not the island’s many beetle varieties, but secret flaws in computer code that governments pay hundreds of thousands of dollars to learn about and exploit.
A new Red Alert Research Report from Varonis, based on survey data from 248 information security professionals, indicates that a mere 6% of companies have automated breach detection.
Sony has finally agreed to pay the £250,000 (nearly $400,000) that UK authorities handed in January following the conclusion of an investigation into the hacking of its PlayStation Network in 2011. The incident compromised millions of users’ account details.
Small and medium businesses rarely call up security consultants asking for help in improving their incident-response program; instead, when the companies do call, they are usually panicked, in the midst of a real security incident.
Edward Snowden, the leaker of U.S. National Security Agency surveillance activities, may have changed his position about disclosing more information in the future, Russian President Vladimir Putin said Monday, according to news reports.
As the global netizen population has crossed two billion, cyber security experts are worried over the lack of security mechanisms online and fear that the next generation of threats could emerge out of cyberspace.
Around half of the world’s securities exchanges were the target of cyber-attacks last year, according to a paper based on a survey of 46 exchanges released on Tuesday.