The controversial hacker The Jester (th3j35t3r), who is a vocal supporter of the US government, told us a few days ago that US authorities didn’t need his help in locating and apprehending the NSA whistleblower Edward Snowden.
Author: ISBuzz Team
Between 10 July and 15 July 2010, the first call of the day and the last call of the night that Aaron Graham made on his mobile phone showed he was probably sleeping at home.
Late last December ended with a hacker leaking data on 300,000 Verizon FIOS customers which was apparently stolen via a third-party partner of Verizon
In the wake of embarrassing leaks by Edward Snowden about the National Security Agency’s domestic and international intelligence gathering, the agency is trying to figure out how it lost control of this information and how to prevent it from happening again.
It’s very difficult for the beginner security analyst, mainly the ones interested in the area of pentesting, to find good study pentesting resources. Starting from the principle that in pentesting there are many other sub areas of study, it becomes more and more difficult to choose and then find a proper pentesting study application.
May 14th 2013, we launched a poll titled: “Vote for your favorite Linux Penetration Testing Distribution” (you can still vote!) and – year to date – June 28th 2013, the poll has received over 200 votes!
Treasury Secretary Jack Lew raised concerns on cyber security during his meeting with Chinese President Xi Jinping in China.
America’s largest commercial ports have failed to shore up defenses against potential cyber attacks, a new study contends, raising concerns about the vulnerability of computer networks that help move energy, foodstuff and other goods to market.
Cyber security isn’t just an issue for governments and corporations, but an issue we all face—that’s because the favorite weapon of hackers and terrorists is your computer.
Senator Coons hosted a Senate Law Enforcement Caucus briefing on cyber security Wednesday to highlight the crucial role state and local agencies play in the fight against cybercrime, an increasingly common security threat.