When looking at recent case law and Supreme Court rulings on how advances in technology affect the rights of the accused it appears to be a mixed bag.
Browsing: Identity and access management (IAM)
Apple says it will fix an embarrassing security flaw on its new iOS 7 software which hackers showed can bypass the lockscreen and access personal data.
Seamless Integration Keeps Privileged Passwords Secure During System Scans for Vulnerability Management and Policy Compliance
ENISA presented its list of top cyber threats, as a first “taste” of its interim Threat Landscape 2013 report. The study analyses 50 reports, and identifies an increase in threats to: infrastructure through targeted attacks
Forget the debate around the security or insecurity of the iPhone 5s’s fingerprint reader. The latest version of the iPhone’s operating system currently offers a gaping hole in its old-fashioned passcode lockscreen.
More than three months after Edward Snowden revealed details of NSA secret surveillance activities, intelligence officials are still assessing the fallout from the former contractor’s disclosures. But they already know how the leaks happened.
A gang has been arrested on suspicion of hijacking the computer system in a Barclays bank to siphon off £1.3million.
It wasn’t ever seriously in doubt, but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting
IT departments are in a tight spot with Java. The pervasive development language comes with serious security risks, yet many business apps still rely on Java to function.
Interested in denying someone access to the Internet? Ten dollars provides a very nice DDoS (Distributed Denial of Service) platform, featuring one 60-second long attack that can be used as often as needed for an entire month.