China’s largest search engine Baidu is planning to acquire two leading app stores in the country for US$1.9 billion, as the company seeks to expand its presence in the mobile Internet space.
Browsing: News & Analysis
At Information Security Buzz, we deliver the latest cybersecurity news, featuring expert insights, industry updates, and in-depth analysis.
The Washington Post has recently reported on the exploits of Luigi Auriemma, 32, and Donato Ferrante, 28, two Italian hackers that work from the island of Malta, searching for flaws in computer codes that they can sell to countries that want to break into the computer systems of foreign adversaries.
That’s how many emails most “working professionals” send and receive every day.
Protection of consumer data in the cloud features highly in the Australian Computer Society’s (ACS’s) call for submissions on the federal government-backed Consumer Cloud Protocol (CCP).
Two security researchers announced that they have succeeded to transform Verizon mobile phones into spy tools to track Verizon’s users.
F-Secure is reporting that some new malware attempts in OS X are using a spoofing technique to disguise malicious installations as standard files. The technique involves using a special Unicode character in file names that will make an application appear to be a standard document file.
Despite the increased profile of cyber security threats, counter-terrorism remains the primary focus of the UK’s intelligence and security agencies.
Bluebox Security, the mobile security startup that’s “working to save the world from information thievery”, has made a name for itself by finding and revealing the existence of an vulnerability that put 99 percent of all Android users in danger of unknowingly downloading malware.
Within Information Security Operations the derived value is in the response to correlated data. These sources typically tend to scale horizontally as organizations buy into further hard assets to assist them in mining the Big Data for answers.
There are times like this when I can’t help but wonder about disaster recovery plans. A large number of companies that I have worked at or spoken with over the years seemed to pay little more than lip service to this rather significant elephant in the room.