Dubai: Hackers today don’t even need to gain access to a target’s computer and could use “social engineering” on the target when it comes to disclosing information, Kevin Mitnick, the hacker-turned international cyber security consultant and the keynote speaker at the inaugural Gulf Information Security Expo and Conference (Gisec) Conference taking place at Dubai World Trade Centre, said.
Browsing: Identity and Access Management (IAM)
As more employees continue to access consumer cloud accounts at work (regardless of IT rules), the enterprise world is about to reach a breaking point, based on a new report.
LinkedIn is the latest website to add two-factor authentication as a measure to prevent account takeovers.
Barack Obama will confront Chinese president Xi Jinping next week over a spate of cyber-attacks on the US, including the latest allegation that Chinese hackers gained access to more than two dozen of America’s most advanced weapons systems.