The notorious RedHack collective has breached another major website of the Turkish government, the one of the Istanbul Special Provincial Administration (ioi.gov.tr).
Browsing: Identity and Access Management (IAM)
As cybercrime expands and evolves, a new study categorizes and describes the top five threats: data breaches, malware, DDoS, mobile threats and the industrialization of fraud – and they’re all interrelated.
Companies like Facebook have been scrutinized by government regulators over the use of facial recognition technology. Now the Electronic Frontier Foundation is putting a mirror up to the government to demand the same scrutiny back.
The fallout from the Prism leak continues. As people digest what the leaks mean, ripples are going out into the business community.
If you use Gmail and have ever wondered how much your account might be worth to cyber thieves, have a look at Cloudsweeper
Hackers say they have leaked personal details of tens of thousands of U.S. troops to websites, South Korean news reports and online security officials said on Wednesday, a day after cyber attacks disabled access to government and news sites.
“How GCHQ watches your every move” is the Guardian’s front page headline.
Next Friday, June 28, marks the launch of Quantum Dawn 2.
A recent survey shows that even before PRISM news broke, six out of ten consumers were concerned about the security of storing their content in social networking and cloud storage services.
Edison, NJ, June 23, 2013 –(PR.com)– StrikeForce Technologies, Inc. (OTCBB: SFOR) today reported it has signed an agreement with Cyber Wealth Alliance, Inc. (CWA), one of Europe’s leading Cyber Security Distributors.