Security researchers and hackers are caught up in an endless game of cat and mouse, with threats constantly evolving to…
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
Never before has Mac OS X been as heavily targeted by cybercriminals as now. Whereas infections like browser hijackers and…
The threat landscape in 2016 is almost completely unrecognisable from that of ten years ago. Today’s landscape is populated by…
In a world of technological dependence, I like most other professionals suffer from increasing degrees of paranoia, and fear that…
That the CMS Wordpress is a common choice in blog platforms everybody knows, but what we see is that this…
The rapid development of drone technology and growing awareness of their potential threat has lead to a burgeoning drone detection…
Notes from the Battlefield: Cybercriminals vs. Business Travelers and How to Keep Your Data Safe It used to be that…
The kerfuffle over naming of vulnerabilities like Badlock and ShellShock misses the mark on why this is a good thing…
Major web browsers are to consider blocking the cryptographic hash function Secure Hash Algorithm (SHA)-1 from as early as June…
USB Thief, a new threat to data, is capable of stealthy attacks against air-gapped systems and also well protected against…