The South Korean government is planning to train up 5,000 information security experts to address the growing threat from Pyongyang and a shortage of home-grown talent.
Author: ISBuzz Team
Researchers at MIT, Harvard and the Vienna University of Technology have developed a proof-of-concept optical switch that can be controlled by a single photon and is the equivalent of a transistor in an electronic circuit.
The first half of 2013 has seen little change to the threatscape – it’s largely more and worse of the same: more malware, more spam, more sophisticated mobile malware, more espionage and more arrests, with just a couple of new developments.
Hackers bombarded Nintendo for a month with 15.46 million bogus login attempts, out of which 23,926 struck the jackpot, exposing names, addresses, phone numbers and other personal details of corresponding Club Nintendo customers.
A vulnerability that could affect 99 percent of the world’s Android-powered phones and tablets has been unearthed within the Google-owned platform.
Despite the inherent technical “geekiness” of cyberspace and urgent Defense Department efforts in that area, people and partners are among DOD’s most critical cyber needs, the senior military advisor for cyber to the undersecretary of defense for policy said last week.
A privacy debate has erupted in Japan over a new service from a major rail operator that sells private e-ticket records as marketing data.
While the majority of CISOs may profess a commitment to managing security based on risk management principles, the truth about how they execute on those principles may be a lot more imperfect.
Ramadan in 2013 started on Tuesday, the 9th of July and will continue for 30 days until Wednesday, the 7th of August.
Recent revelations about the extent of surveillance by the U.S. National Security Agency come as no surprise to those with a technical background in the workings of digital communications.