Blockchain Systems: Known Attack Vectors And Countermeasures
There is no bulletproof digital network, and blockchain doesn’t stand out from the rest in this regard. However, the attacks targeting distributed ledgers differ from
Home - New Cyber Technologies - Page 4
There is no bulletproof digital network, and blockchain doesn’t stand out from the rest in this regard. However, the attacks targeting distributed ledgers differ from
Researchers have uncovered yet another flaw in Intel’s hardware. It can allow attackers to eavesdrop on virtually every bit of raw data that a victim’s
The media headlines were about the end of austerity and the digital sales tax on Google and Amazon. Yet from the viewpoint of a technology
The media headlines were about the end of austerity and the digital sales tax on Google and Amazon. Yet from the viewpoint of a technology
A vibrant, connected community of ethical hackers has an important role to play in the increasingly complex fight against cyber-crime, explains Brigitte d’Heygère, Vice President
Recently Atlas Quantum, a cryptocurrency investment platform, announced a data breach that exposed the personal details of about 261,000 users. The compromised information includes names, phone numbers,
NCSC SUPPORTS INDUSTRY DRIVE TOWARDS COMMON STANDARDS FOR SECURE COMMUNICATION NCSC joins not-for-profit membership organisation Secure Chorus Membership underlines support for common standards for
New Cognizant report finds 60% of senior IT executives claiming there are more cyber threats in their organisation than they can currently control 60% say
Newest paper finds that despite awareness of threat posed by quantum computing, little is being done to prepare The Cloud Security Alliance (CSA), the world’s leading organization
Orchestration and Automation In 2018, cybersecurity orchestration and automation will increase in both relevance and adoption. This will be driven by the well-documented skills shortage
Information Security Buzz (aka ISBuzz News) is an independent resource that provides the experts comments, analysis and opinion on the latest Information Security news and topics