Last week, FBI raids on Freedom Hosting and child porn distributors took down Tor Mail, a secure email provider for users of the Tor network.
Browsing: News & Analysis
At Information Security Buzz, we deliver the latest cybersecurity news, featuring expert insights, industry updates, and in-depth analysis.
The “Comment Crew,” a group of China-based hackers whose outing earlier this year in major media outlets caused a row with the U.S., have resumed their attacks against dissidents.
A Cryptzone security survey undertaken amongst SharePoint practitioners at the Microsoft conference in Las Vegas, reveals how many organizations have inadequate security and governance measures
This year, cloud computing is definitely poised to gain importance among enterprises.
The Snowden incident where, according to the New York Times (21Jun2013), a government intelligence worker was able to easily copy and disseminate large amounts of highly sensitive and classified data
DOSarrest Internet Security announced today that it will begin offering a website Vulnerability Testing and Optimization (VTO) service.
Information security has always required specialised knowledge – not least to decipher all the acronyms and geek speak!
I have spent the last 18 months pondering on the whole sphere of identity and authentication and a number of things have happened:
Cybercriminals will unleash a wave of “zero-day” vulnerabilities to attack Windows XP machines after April 8, 2014, a security expert has claimed. Microsoft will stop releasing security updates for the OS on that date.
Cloud computing is growing, both as an external business tool and as a way to better manage IT in the enterprise.