While many defenders spend much of their time analyzing tools and tactics of their adversaries, getting into the head of potential intruders and determining how they’re motivated can tip defenders off to an attack as surely as a tell will tip off the good hand of a gambler.
Browsing: News & Analysis
At Information Security Buzz, we deliver the latest cybersecurity news, featuring expert insights, industry updates, and in-depth analysis.
This time last year, after Computer Weekly announced the first of our now-annual list of the 25 most influential women in IT, I wrote in this blog about why we don’t want to have to write about the issue of women in IT anymore.
You’ve probably seen them making the rounds on social media: the brain-busting, stutter-inducing questions asked in job interviews at places like Google (How many cows in Canada?)
Jay-Z’s ‘Magna Carta Holy Grail’ app was cloned by computer hackers to display anti-government messages.
To regain the upper hand against next-generation attacks, enterprises must turn to true next-generation protection: signature-less, proactive, and real-time
Hackers are exploiting a bug in Microsoft Windows that was originally disclosed by a Google researcher two months ago.
The Flash update fixes three critical vulnerabilities while the ColdFusion and Shockwave updates fix one each. Internet Explorer 10 and Chrome users will have the Flash updates installed automatically by the browser.
The U.S. may be the global center of the IT universe, but India will exceed the U.S. in the number of software developers by 2017, a new report notes.
Game maker Konami said one of its online portals has been hit by a mass of illicit login attempts, with attackers gaining access to over 35,000 accounts, just days after Nintendo revealed a similar attack on one of its sites.
The Bring Your Own Device (BYOD) movement is supposed to boost worker productivity but a study released on Monday said it can also breed distrust between employees and IT departments.