Smartphones carry a lot of sensitive data that in theory should be accessible only to their owners. In practice, a lot of it can be exfiltrated from the devices and from the backups either stored on the device or in the cloud
Browsing: News & Analysis
At Information Security Buzz, we deliver the latest cybersecurity news, featuring expert insights, industry updates, and in-depth analysis.
I’ve heard the term hacking used for non technical things a few too many times lately. It makes me wonder if perhaps its overuse is making the average person not care about security because they believe it’s a purely technical issue
A privacy group lacks legal standing to challenge a U.S. National Security Agency data collection program, and the U.S. Supreme Court doesn’t have jurisdiction to grant the group’s request for it to review the program’s legality
Security firm Imperva revealed that more than 35000 websites based on vBulletin CMS have been hacked exploiting a known vulnerability.
Several outlets have been reporting on an apparent hardware bug in the iPhone 5s accelerometer/gyroscope. The defect manifests itself in accelerometer-based apps and Apple’s Compass app
Gartner last month released its “Five styles of Advanced Threat Defense” framework which attempts to update a layered defence model for enterprises to be able to protect against APTs or ATAs.
LONDON, UK — October 17, 2013 — Tripwire, today announced that Dwayne Melancon, CTO for Tripwire, will moderate a panel discussion at RSA Conference Europe 2013.
Two Republican lawmakers Wednesday demanded that the U.S. Department of Health and Human Services (HSS) provide information on security measures used to secure the Federal Data Services Hub
In the maritime business, Automated Identification Systems (AIS) are a big deal. They supplement information received by the marine radar system, are used for a wide variety of things – including ship-to-ship communication
Wisegate released a new report that shares how CISOs successfully gain executive buy-in on security budgets and strategically manage them.