Computer networks can be threatened by a host of potentially unexpected sources. Some of these start with ‘wardriving.’ Naturally, this begs a few questions…
Author: ISBuzz Team
You would have thought, maybe in light of recent events — I don’t know, perhaps a little thing called mass U.S. surveillance of foreign nationals — that the U.K. parliament, of all institutions, would be taking data protection and privacy a little more seriously.
There was a popular Aflac Insurance commercial series that ran several years ago featuring New York Yankee great Yogi Berra, known as much for his clever quips as his Hall of Fame baseball talents.
With all the stories currently making the rounds about NSA Hacking, the PRISM program, GCHQ setting up web cafes, Phine chargers that hack your phones and even Manchester City gettign hacked, you’d be forgiven for being a little sceptical as to why your comapny should move to the cloud.
In the wake of the recent NSA / Prism debacle, there has been a large push for secure, encrypted communications for the average user.
Britain is seeing about 70 sophisticated cyber espionage operations a month against government or industry networks, British intelligence has told the BBC.
In the realm of IT security, when organisations have their very business on the line, the instinct for most companies is to simply throw money and technology at the problem, upgrading technical systems at every opportunity to keep pace with emerging threats.
CNN’s Political Ticker blog was hacked last week. The hacker published a bogus story entitled “Anonymous Bitcoin operator Btc-e.com goes out of business.”
A group of 26 U.S. senators, cutting across party lines, are seeking “public answers” on whether the National Security Agency collected in bulk other data such as credit card purchases and financial information in the U.S. besides phone records.
Tougher measures to ensure the security of personal information are needed, legal experts said, after police detained four people accused of illegally purchasing students’ family details and defrauding money from their parents.