Metaforic announced the general release of WhiteBox, a secure cryptography solution for mobile financial, conditional access, BYOD and embedded communications and payments.
Browsing: Identity and Access Management (IAM)
The US has said that it only gathers as much foreign intelligence as every other country, after a German newspaper accused the country’s National Security Agency of bugging EU offices.
Game maker Konami said one of its online portals has been hit by a mass of illicit login attempts, with attackers gaining access to over 35,000 accounts, just days after Nintendo revealed a similar attack on one of its sites.
The 28 EU member states currently have a patchwork of varying tariffs for cyber crime but will now introduce a policy across the European Union.
Cyber security is still a relatively new area, constantly evolving as a result of the tech savvy world in which we live.
In the wake of embarrassing leaks by Edward Snowden about the National Security Agency’s domestic and international intelligence gathering, the agency is trying to figure out how it lost control of this information and how to prevent it from happening again.
Major vulnerabilities in a protocol for remotely monitoring and managing servers would allow attackers to hijack the computers to gain control of them, access or erase data, or lock others out.
We recently posted: “A day in the life of a penetration tester (ethical hacker). What’s it like?” which covered the ‘fun’ and ‘boring’ bits of the job.
Computer networks can be threatened by a host of potentially unexpected sources. Some of these start with ‘wardriving.’ Naturally, this begs a few questions…
A group of 26 U.S. senators, cutting across party lines, are seeking “public answers” on whether the National Security Agency collected in bulk other data such as credit card purchases and financial information in the U.S. besides phone records.