Few who follow the ongoing, often vociferous international debate about the proper balance between protecting society and guarding civil rights and personal privacy will have been totally surprised last week to learn that the US government’s secretive National Security Agency (NSA) and Federal Bureau of Investigation (FBI) regularly access internet and phone records.
Browsing: News & Analysis
At Information Security Buzz, we deliver the latest cybersecurity news, featuring expert insights, industry updates, and in-depth analysis.
It seems that targeting football clubs, football celebrities, and football events has become a habit for phishers. They continue their uncivilized activities and in particular single out football.
The federal privacy watchdog says she will look into any implications for Canada posed by possible U.S. government snooping on a wide scale.
We all know them – the BYOD Bettys, Cloudy Claudettes, and even Frightened Frank, the CSO who only says “no.”
Cyber security professionals are among the most in-demand individuals in the UK and could soon be earning the same amount of money as footballers, according to the head of Kaspersky Labs.
Secure Code Reviews (bringing someone in from outside of the team to review/audit the code for security vulnerabilities) and application Pen Tests (again, bringing a security specialist in from outside the team to test the system) are both important practices in a secure software development program.
Dropbox has recently revised its claims on how securely they maintain user data, prompting a lawsuit claiming that Dropbox has misled its customers about its privacy policy and encryption processes.
While technology has been at the forefront of the news lately, with foreign surveillance programs being identified for monitoring UK phone calls and internet data and space robots discovering historical proof of water on Mars, most of this news has been around how technology helps create histories – either of data or physical changes.
Reporting on data breaches is important to keep readers up to date with healthcare data breaches as means to keep all of the stakeholders involved – healthcare organizations, vendors and patients – informed.
It may seem strange to say, but there are probably a lot of people involved in IT security who long for the “good old days” when the threats were limited to computer viruses getting downloaded through email and hackers trying to break through a firewall.