No one disputes that data privacy breaches pose a serious threat to cyber safety – least of all businesses who are often the victims. But is more government red tape in the form of mandatory data breach reporting really the fix?
Author: ISBuzz Team
Hiring projections for new graduates are down (see below), and those grads who do get interviews need to focus on the basics.
Revelations of US spooks monitoring the internet have freaked out consumers so much that privacy protection software will be The Next Big Thing.
IT Masters and Charles Sturt University are offering, free, a six week online course designed to prepare students for the Certified Information Systems Security Professional (CISSP) Security Certification that is comparable to other online courses that can cost up to $3800.
Nearly half of the companies that participated in the ‘IDC market analysis perspective: a worldwise security products survey’ conducted by IDC in December 2012, believe that increasingly sophisticated attacks pose a serious threat to their IT infrastructures.
The U.S. Foreign Intelligence Surveillance Court has ordered the government to declassify its secret order and parties’ briefs in a case which Yahoo expects will demonstrate that it resisted government directives.
Trend Micro says it detected a targeted attack that sent malware-laden emails to representatives of 16 European countries and some Asian governments.
Over the last number of years there has been a noticeable rise in the number of reported targeted attacks, which are also commonly referred to as advanced persistent threats (APTs). Notable examples of said attacks include the Red October campaign or the IXESHE APT.
China’s largest search engine Baidu is planning to acquire two leading app stores in the country for US$1.9 billion, as the company seeks to expand its presence in the mobile Internet space.
The Washington Post has recently reported on the exploits of Luigi Auriemma, 32, and Donato Ferrante, 28, two Italian hackers that work from the island of Malta, searching for flaws in computer codes that they can sell to countries that want to break into the computer systems of foreign adversaries.