Buffer, a social media app, allows its users to schedule and automatically post updates to social media sites such as Facebook and Twitter.
Browsing: Breaches
The team behind popular web programing site PHP.net is in the process of restoring services and tightening security in the aftermath of a hack that exposed visitors to JavaScript-based exploits.
Digital forensics refers to the processes involved in examining data from harddrives, volatility memory (RAM), network captures, and a wide range of digital devices for artifacts that remain after specific actions occurred on a system.
IBM today announced a new cloud solution that combines software analytics and cloud security services to fend off web-based Distributed Denial of Services (DDoS) attacks for organizations doing business on the web and in the cloud.
Lancope Presents Webinar on Safeguarding patient information and Defending Healthcare Networks with NetFlow
Anti-Virus (AV) software, along with its Firewall side-kick, has been the standard weapon against Internet borne threat for the past two decades. But in a changing threat landscape AV is fast beginning to look past its sell-by date.
Dave Anderson, Senior Director, Voltage Security, explains how organisations can overcome a common barrier to cloud computing adoption
I’ve heard the term hacking used for non technical things a few too many times lately. It makes me wonder if perhaps its overuse is making the average person not care about security because they believe it’s a purely technical issue
LONDON, UK — October 17, 2013 — Tripwire, today announced that Dwayne Melancon, CTO for Tripwire, will moderate a panel discussion at RSA Conference Europe 2013.
Recently I was reminded of this well used, wedding related phrase when my daughter announced her intention to marry. A joyous occasion for all, except, of course, the father of the bride (yes we’ve all seen that film!).