Earlier this year, researchers published analyses of targeted attack known as Operation Arid Viper [1] (aka Desert Falcons [2], aka…
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
There is a growing culture of impatience in today’s fast-paced world. The demand for instant results means that most users…
[su_box title=”About TSG” style=”noise” box_color=”#336588″]With experienced specialists across all areas of technology from infrastructure to telecoms, CRM to ERP, business…
This year, disaster recovery (DR) has been a top priority for 45 per cent of UK IT departments. With the…
When you’re looking for an IT solutions company in the Philippines that can offer IT security services, then you have…
The Apple Watch, the Moto 360, the Samsung Gear. Whether you have a fixed BYOD policy or not, these wearable…
As electronics and related code become more integrated into modern vehicles, we are reaching a point where they will require…
ESET discovers a new trojan that lets the attacker see the cards of the victim online poker player. ESET researchers…
Research shows most security breaches are down to people inside the organisation. Workers say this needs to be addressed by…
Android has a major chink in its armor called the Stagefright Android Hack. In this hack, an innocuous looking video-embedded…