In this video, Bruce Schneier talks about trust. We all trust millions of people, organizations, and systems every day — and we do it so easily that we barely notice. But in any system of trust, there is an alternative, parasitic, strategy that involves abusing that trust.
Author: ISBuzz Team
Cyber security spending for critical infrastructure totalled US$41.76 billion globally in 2012, according to an ABI Research report.
Hard work by the administration, the services and the leadership at U.S. Cyber Command is putting in place elements crucial to defending U.S. and allied interests in cyberspace, the deputy assistant secretary of defense for cyber policy said in a recent interview.
The four-star general who headed the reported cyber-attack by American and Israeli hackers on an Iranian nuclear site is under a DoJ investigation over leaking the details of the operation to the press, reports NBC News.
The maintainers of Ruby have fixed a serious flaw in its SSL client that could have allowed an attacker to conduct man-in-the-middle attacks by spoofing an SSL server.
The notorious RedHack collective has breached another major website of the Turkish government, the one of the Istanbul Special Provincial Administration (ioi.gov.tr).
Lord Leveson was yesterday called to appear before MPs – amid growing anger at his failure to reveal widespread phone-hacking by big business.
Providers and analysts claim confusion reigns supreme, but government bodies beg to differ
As cybercrime expands and evolves, a new study categorizes and describes the top five threats: data breaches, malware, DDoS, mobile threats and the industrialization of fraud – and they’re all interrelated.
Initially Edward Snowden served as a legitimate whistleblower — he published the first concrete evidence of the NSA’s domestic surveillance apparatus, corroborating claims made by previous whistleblowers and raising serious questions about the constitutionality of the NSA running a widespread, warrantless domestic dragnet with weak oversight.