The City of Johannesburg has brought a criminal case against the person who hacked into its billing system last week, it said on Monday.
Browsing: Breaches
Were you trying to access a .cn Internet address over the weekend? Are you still hitting refresh?
In 2012 we saw significant data breaches across multiple industries and governments impacting millions of users. This year seems to be bring more of the same. Is this an uncertain future we will have to live with?
An external review of Bloomberg’s data policies and procedures has recommended stronger measures be put in place in order to ensure journalists are unable to view client information through its financial data terminals.
The key to improving a web security program is having a comprehensive metrics program in place – a system capable of performing ongoing measurement of the security posture of production systems, exactly where the proverbial rubber meets the road.
Despite it being nearly impossible to avoid news about malware, cyber-espionage and other cybersecurity woes,
The 2013 Live Threat Intelligence Impact Report from the Ponemon Institute, sponsored by Norse reveals how 700+ respondents from 378 enterprises defines
Figures obtained by the Irish Examiner show the security breaches have occurred across the country over the past four years.
DOSarrest Internet Security announced today that it will begin offering a website Vulnerability Testing and Optimization (VTO) service.
I have spent the last 18 months pondering on the whole sphere of identity and authentication and a number of things have happened: