It’s well established that all organizations, regardless of nature and size, are facing significant online threats that, in many cases,…
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
As usual, the cyber blame game goes into full swing after a major breach. Although the targeted data breach at…
Researchers from Proofpoint have detected a campaign of millions of messages directed at organizations in the US and UK. The…
Criminals spying on high-value targets in Ukraine, Russia and Belarus, and their encrypted data. ESET, a global leader in IT security…
In August 2014, the US-based Institute of Internal Auditors Research Foundation published (together with ISACA at their 2014 GRC joint…
Google is embarking on a countrywide roadshow this summer to inform and train the public on how to be safer…
There’s no doubt that organisations of all sizes and across industries are drowning in big data, and the volume of…
Ken Westin, senior security analyst for Tripwire has been noting the potential for this “Hammertoss” cyber espionage scenario for some time…
News has broken that United Airlines have been breached by the group of China-backed hackers believed to have been behind…
Researchers have hacked an air-gapped computer using a mobile phone, posing a serious threat to critical infrastructure. The attack requires…