The number of requests for Twitter user data from governments around the world continued to grow in the first half of 2013, the microblogging service said in its semiannual transparency report, released Wednesday.
Browsing: News & Analysis
We published latest Information security news with experts and Industry leaders insight and analysis
Black Hat 2013 Security researchers say they have developed an interesting trick to take over Gmail and Outlook.com email accounts – by shooting down victims’ logout requests even over a supposedly encrypted connection.
Finally, after two years from the first release of the feature and hoping that the users will switch to https, Facebook enforces now https to all users by default.
Panda Security released Panda Cloud Office Protection (PCOP) 6.7, which will enable users to roll-out Panda Cloud Systems Management (PCSM) automatically on their network.
The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found vulnerabilities.
The recently disclosed Android master key vulnerability by CTO of BlueBox, Jeff Forristal, allows an attacker to inject malicious code into an Android application without the need to alter or invalidate the application’s digital signature.
Distributed denial of service (DDoS) attacks continue to be a global threat with a clear increase in attack size, speed and complexity, according to the latest report from Arbor Networks.
The Cloud Security Alliance (CSA) is addressing cloud customer concerns about data security by tying up with the British Standards Institute (BSI).
UK journalist and feminist leader Caroline Criado-Perez spearheaded a campaign to replace Charles Darwin’s image with Jane Austen’s on a British banknote.
Microsoft, Apple, and every maker of mobile and desktop apps on the planet all have a problem: The moment they issue a security “patch,” or an update to their software designed to plug a hole that could be exploited by hackers