I clearly remember the first time I saw a computer. Someone was playing a video game called Demo Rush 3…
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
A hacker gang dubbed Anunak pulled off a high-profile attack against Energobank based in Kazan, the capital of the Republic…
Phishing is an increasingly devious, almost artistic, threat. The ultimate goal is to trick a target into either downloading malware…
Garter’s Magic Quadrant (MQ) 2015 for Web Application Firewalls (WAF) estimates that the global WAF market size is as big as $420…
It doesn’t matter what industry you are in: passwords are going to be a major player in daily lives no…
Data breaches are expensive. Gross costs stemming from Target’s infamous 2013 breach totaled $252 million. And the Ponemon Institute’s annual…
Advertisements and marketing are inseparable concepts. It’s embedded e-commerce content that allows various online services to exist without charging their…
The planets are aligning against the privacy of every individual who uses a healthcare system; those planets being complexity and…
Ordinarily, falling victim to a ransom plot means that you are the son or daughter of some wealthy person and…
Many of the modern gifts are digital products like notebooks, ultrabooks, tablets, smartphones. How do we protect our children when…