IT Masters and Charles Sturt University are offering, free, a six week online course designed to prepare students for the Certified Information Systems Security Professional (CISSP) Security Certification that is comparable to other online courses that can cost up to $3800.
Browsing: News & Analysis
We published latest Information security news with experts and Industry leaders insight and analysis
Nearly half of the companies that participated in the ‘IDC market analysis perspective: a worldwise security products survey’ conducted by IDC in December 2012, believe that increasingly sophisticated attacks pose a serious threat to their IT infrastructures.
The U.S. Foreign Intelligence Surveillance Court has ordered the government to declassify its secret order and parties’ briefs in a case which Yahoo expects will demonstrate that it resisted government directives.
Trend Micro says it detected a targeted attack that sent malware-laden emails to representatives of 16 European countries and some Asian governments.
Over the last number of years there has been a noticeable rise in the number of reported targeted attacks, which are also commonly referred to as advanced persistent threats (APTs). Notable examples of said attacks include the Red October campaign or the IXESHE APT.
China’s largest search engine Baidu is planning to acquire two leading app stores in the country for US$1.9 billion, as the company seeks to expand its presence in the mobile Internet space.
The Washington Post has recently reported on the exploits of Luigi Auriemma, 32, and Donato Ferrante, 28, two Italian hackers that work from the island of Malta, searching for flaws in computer codes that they can sell to countries that want to break into the computer systems of foreign adversaries.
That’s how many emails most “working professionals” send and receive every day.
Protection of consumer data in the cloud features highly in the Australian Computer Society’s (ACS’s) call for submissions on the federal government-backed Consumer Cloud Protocol (CCP).
Two security researchers announced that they have succeeded to transform Verizon mobile phones into spy tools to track Verizon’s users.