Security

Wikileaks released documents from Sony hack, the company condemned itWikileaks released documents from Sony hack, the company condemned it

Wikileaks released documents from Sony hack, the company condemned it

WikiLeaks on Thursday published a searchable database of more than 30,000 documents that were obtained by hackers in the cyber…

10 years ago
Chrome starts pushing Java off the Web by deprecating NPAPIChrome starts pushing Java off the Web by deprecating NPAPI

Chrome starts pushing Java off the Web by deprecating NPAPI

Google Launches Chrome 42 that deprecates the NPAPI (Netscape Plugin API)  due to the numerous problems it caused in the…

10 years ago
Dell report revealed attacks on SCADA system are doubledDell report revealed attacks on SCADA system are doubled

Dell report revealed attacks on SCADA system are doubled

A recent report published by Dell revealed a 100 percent increase in the number of attacks on industrial control (SCADA)…

10 years ago
Bank and vendors – Which are the threats to cyber security?Bank and vendors – Which are the threats to cyber security?

Bank and vendors – Which are the threats to cyber security?

The NYDFS released a new report on the Cyber Security in the Banking Sector that highlights problems faced by almost…

10 years ago
Encryption Increases Its Popularity and US Is in a DilemmaEncryption Increases Its Popularity and US Is in a Dilemma

Encryption Increases Its Popularity and US Is in a Dilemma

Encryption has been used by more people over time and this has led to the NSA and the US Government…

10 years ago
Security Affairs newsletter Round 4 – Best of the week from best sourcesSecurity Affairs newsletter Round 4 – Best of the week from best sources

Security Affairs newsletter Round 4 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

10 years ago
Compliance: An Often Overlooked, Powerful Method of Threat PreventionCompliance: An Often Overlooked, Powerful Method of Threat Prevention

Compliance: An Often Overlooked, Powerful Method of Threat Prevention

Which are different components that must be taken into consideration  to build an efficient information security foundation and prevent cyber…

10 years ago
DARPA is developing a tool do detect Android MalwareDARPA is developing a tool do detect Android Malware

DARPA is developing a tool do detect Android Malware

A team or researchers sponsored by the US DARPA has developed a new innovative tool to improve the detection of…

10 years ago
Snowden keeps saying that US is still catching our emailsSnowden keeps saying that US is still catching our emails

Snowden keeps saying that US is still catching our emails

The British television host scored a rare one-on-one interview in Moscow with Edward Snowden for the Sunday's edition of the…

10 years ago
Security Affairs newsletter Round 3 – Best of the week from best sourcesSecurity Affairs newsletter Round 3 – Best of the week from best sources

Security Affairs newsletter Round 3 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

10 years ago