Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » SECURITY INFORMATICS » Hacking

Hacking research: attacks every 39 seconds.

Hacking research:  attacks  every 39 seconds.

A Clark School study at the University of Maryland is one of the first to quantify the near-constant rate of hacker attacks of computers with Internet access—every 39 seconds on…

Five things to do if you get hacked.

Five things to do if  you get hacked.

Recent studies all seem to agree on one point – that a cyberattack is a near certainly for every organization. Some organizations may be victimized more than once. Here are…

U.S. judges empowered to allow Feds to remote search on computers, anywhere.

U.S. judges empowered to allow Feds to remote search on computers, anywhere.

In April 2016, the U.S. Supreme Court approved the modified version of Rule 41 of the Federal Rules of Criminal Procedure. The amendments empower U.S. judges to issue search warrants…

Five cybersecurity resources that spooks relies on.

Five cybersecurity resources that spooks relies on.

Bob Flores, former CTO with the Central Intelligence Agency (CIA) in the US, and now managing partner for Cognito Corp, has shared some key insights around data security in Australian…

Businesses competitive advantage is having successful cyber security actions.

Businesses competitive advantage is having successful cyber security actions.

In an environment where companies have to compete on a global scale, is important having an experienced staff to address technology security concerns and be able to act proactively to emerging…

Ransomware and Computers under siege.

Ransomware and Computers under siege.

There’s so much doom and gloom in the security industry because of ransomware. And yet, occasional success stories inspire us to fight back. READ ARTICLE HERE RANSOMWARE IS MALWARE that…

Brazil: Cybercrime in 2015.

Brazil: Cybercrime in 2015.

Short News by Victor Björgan .- Brazilian cybercriminals mostly operate on the surface web via public forums and apps, largely due to the cybercriminals’ disregard for law enforcement and law…

Expert´s 13 cybersecurity predictions for 2016.

Expert´s 13 cybersecurity predictions for 2016.

Short News by Victor Björgan.- During 2016, the Internet of Things will increasingly be exploited by hackers. With more and more products including cars, refrigerators, coffee makers, televisions, smartwatches, webcams,…

While officials fears ISIL´s hacking efforts, some security experts diverge.

While officials fears ISIL´s hacking efforts, some security experts diverge.

Short News by Victor Björgan.- George Osborne, the British chancellor of the Exchequer, said in a speech last month that Islamic State militants were trying to develop the ability to…

Acc to CNN report, Iranian hackers are misusing LinkedIn profiles to spy .

Acc to CNN report, Iranian hackers are misusing LinkedIn profiles to spy .

A group of suspected Iranian hackers are using a sophisticated network of fake LinkedIn profiles to spy on unsuspecting targets worldwide — including the U.S. — according to a new…

Page 1 of 6123Next ›Last »