Sunrise, FL – September 30, 2013 – Easy Solutions, the Total Fraud Protection® company, today announced a number of new features for its DSB mobile browser.
Browsing: News & Analysis
At Information Security Buzz, we deliver the latest cybersecurity news, featuring expert insights, industry updates, and in-depth analysis.
Check out this recent DEFCON 20 documentary directed by Jason Scott. Getting behind the scenes at DEFCON last year, this video gives a great insight in to almost everything that goes off at one of the biggest hacking events in the world.
Governments should be more open and accountable to the public about their online surveillance activities, according to a resolution released yesterday by privacy commissioners
Google hire between .01% – .04% of applicants per year and they boast that they look at every single resume they receive, even if that’s over a million! They must have a very busy HR department.
This year, over 80 million identities have already been uncovered through the internet. Have a look at this infographic to become more aware of potential phishing scams and make sure you don’t take the bait.
Italian Researcher Michele Spagnuolo recently revealed a serious vulnerability in the popular Mailbox iPhone app.
The Republic of Sudan was digitally cut off from the world today, amid government protests. The government likely cut the cord to stem outrage over the termination of fuel subsidies, though they have yet to issue an official statement on the matter.
Apple has shown an open pair of ears and a lively pair of heels in dealing with two lockscreen bugs that it introduced with iOS 7.
Last week, Microsoft published some details regarding a new zero-day vulnerability affecting Internet Explorer that was being used in targeted attacks against Japanese targets as Fireeye published last week.
Extensive National Security Agency (NSA) surveillance has led four US senators to introduce the Intelligence Oversight and Surveillance Act, a reform initiative designed to maintain privacy without impeding security.