Computer networks can be threatened by a host of potentially unexpected sources. Some of these start with ‘wardriving.’ Naturally, this begs a few questions…
Browsing: Identity and Access Management (IAM)
A group of 26 U.S. senators, cutting across party lines, are seeking “public answers” on whether the National Security Agency collected in bulk other data such as credit card purchases and financial information in the U.S. besides phone records.
The notorious RedHack collective has breached another major website of the Turkish government, the one of the Istanbul Special Provincial Administration (ioi.gov.tr).
As cybercrime expands and evolves, a new study categorizes and describes the top five threats: data breaches, malware, DDoS, mobile threats and the industrialization of fraud – and they’re all interrelated.
Companies like Facebook have been scrutinized by government regulators over the use of facial recognition technology. Now the Electronic Frontier Foundation is putting a mirror up to the government to demand the same scrutiny back.
The fallout from the Prism leak continues. As people digest what the leaks mean, ripples are going out into the business community.
If you use Gmail and have ever wondered how much your account might be worth to cyber thieves, have a look at Cloudsweeper
Hackers say they have leaked personal details of tens of thousands of U.S. troops to websites, South Korean news reports and online security officials said on Wednesday, a day after cyber attacks disabled access to government and news sites.
“How GCHQ watches your every move” is the Guardian’s front page headline.
Next Friday, June 28, marks the launch of Quantum Dawn 2.