More often than not, the information security industry tends to focus on the negative. It’s hard not to.
Browsing: News & Analysis
At Information Security Buzz, we deliver the latest cybersecurity news, featuring expert insights, industry updates, and in-depth analysis.
Besides releasing in October 2013 the Moto X smartphone, Motorola Mobility’s first handset since it was acquired by Google, the company is working on new methods that would make remembering passwords unnecessary.
Careful what you put between your iPhone and a power outlet: That helpful stranger’s charger may be injecting your device with more than mere electrons.
Let there be light. Or maybe not.vResearchers have discovered a way to trigger and control malware on smartphones using sensory channels, like light, vibrations, music or other sounds.
LinkedIn is the latest website to add two-factor authentication as a measure to prevent account takeovers.
Are we safe online? This is a question asked by many users of the Internet. If you ask information security experts, they’ll say there are a lot of threats on the Web, and they’re becoming more prevalent and sophisticated.
Representations of the security industry and ‘hacking’ have become ubiquitous in popular media in recent years. Representing computer security enthusiasts in what one might consider a less than realistic light.
CIO — Your organization will come under attack. It’s not a matter of “if.” It’s a matter of “when.” And security is no longer simply an operational concern.
The UK Government 2013 released the information security breaches survey fopr 2013.
IT professionals know that cyber security threats become more plentiful and sophisticated every year, and there is no reason for that trend to change.
A recent report by the National Audit Office (NAO) said it would take the UK 20 years to develop the sophisticated skills needed to improve cyber security.