The US and Russia have set up a cyber-war hotline which mimics the “red phone” of the cold war.
Browsing: News & Analysis
At Information Security Buzz, we deliver the latest cybersecurity news, featuring expert insights, industry updates, and in-depth analysis.
Thursday afternoon, a bombshell dropped: Two leading reports claimed that the U.S. government has been spying on emails, searches, Skype calls, and other electronic communications used by Americans for the last several years, via a program known as Prism.
File synchronisation services like Dropbox, Skydrive, iCloud and Ubuntu One are being increasingly used in organisations. The services themselves provide convenience and are often more secure than alternatives like email and FTP.
The United States and Russia have signed a cyberspace communication pact to reduce the risk of conflict on issues including counterterrorism and weapons of mass destruction, APA reports quoting Press TV.
The world may acknowledge India as an information technology superpower, but its very own official cyber security workforce comprises a mere 556 experts deployed in various government agencies.
The word “HACK” is painted across the main square of Facebook’s campus in letters so large that they can be seen from space. The term has lost its negative connotation in Silicon Valley; freewheeling coding sessions and virtual breaking and entering have become the same thing.
In one of the more tasteless literary exercises of the past decade, in 2007, OJ Simpson pushed a combined book-TV special entitled If I Did It, Here’s How It Happened — flipping the proverbial bird to those who believed he was guilty of the 1994 murder of his ex-wife Nicole Brown Simpson, of which he was acquitted.
Controversial Bulgarian media mogul Delyan Peevski was granted access to the highest level of classified information in the country three days before he was even appointed as head of the State Agency for National Security, according to a local paper.
In the murky world of big business, corporate espionage has always been a weapon used by the unscrupulous to make sure they stay ahead of rivals, writes Steve Bates of the Sunday People .
Today we have access to more information than ever before. With the huge resources of the Internet; a massive increase in cheap storage capacity; the phenomenal take up of Cloud computing and social media – new threats and vulnerabilities arise.