Hacked
what-is-doxing-1
hack
cloud_security_password_610-2


chrome

Chrome 40 and SHA-2: Certificate Boogaloo

January 27, 2015

The MD5 cryptographic hashing algorithm had taken a beating from security researchers in the early 2000s. more »

Leave a response »


biometric

Don’t Put All Your Eggs in the Biometric Basket

January 27, 2015

‘Generation Z’ is ready to ditch passwords in favour of biometrics, according to research recently released from Visa. more »

Leave a response »


ics/scada

Industrial Control System (ICS) Security – MWR InfoSecurity Comment

January 27, 2015

In the midst of another vulnerability found in SCADA software, MWR InfoSecurity‘s Rob Miller had the following to say about the increase in these instances, how to prevent it becoming a problem in your organisation and what lies ahead for the future. more »

Leave a response »


privacy

New U.S. Privacy Law Proposals

January 27, 2015

On 12 January 2015, President Obama announced a package of far-reaching and dramatic changes to the shape of privacy laws in the U.S. more »

Leave a response »


password

Fixing Weak Passwords

January 26, 2015

Passwords have been present in information technology since the earliest days. more »

Leave a response »


Healthcare.gov

Healthcare.gov May Be Leaking Sensitive Information – Voltage Security Comment

January 26, 2015

Recent reports that the Healthcare.gov web site may be leaking sensitive information provides another example of why absolutely all sensitive information should be encrypted and encrypted as early as possible, according to Luther Martin, chief security architect for Voltage Security. more »

Leave a response »


cyberwar

Demilitarization of Cyberspace (Discourse)

January 26, 2015

Cyberwar. Cyber-weapons. Cyber super-power. Cyber-attacks. more »

Leave a response »


ransomware

New CryptoLocker-Type Ransomware Strikes in Europe and Latin America

January 26, 2015

ESET researchers have spotted a new type of ransomware cyber-attack spreading in Europe and Latin America. more »

Leave a response »


heartbleed

Cisco’s Heartbleed Vulnerability Claims – Websense Comment

January 23, 2015

Cisco recently claimed that nearly half of all websites that deploy OpenSSL could still be vulnerable to Heartbleed. more »

Leave a response »


penetration testing

Is Penetration Testing Missing the Threat Inside?

January 23, 2015

Penetration testing is used to examine an organisation’s IT systems for potential entry points for attackers. more »

Leave a response »


biometric

Biometric Authentication App Downloads to Reach 770 million by 2019, Finds Juniper Research

January 23, 2015

A new report from Juniper Research has found that that more than 770 million biometric authentication applications will be downloaded per annum by 2019, up from just 6 million this year and dramatically reducing dependence on alphanumeric passwords in the mobile phone market. more »

Leave a response »


virus

Eight of the Worst Computer Viruses Ever to Hit the Headlines

January 23, 2015

As the Internet continues to occupy a bigger and bigger portion of our day-to-day lives, so too does the threat of cyber crime. more »

Leave a response »


cloud

5 Reasons to Not Move to the Cloud

January 22, 2015

There are a number of terms tossed around the business and IT community. more »

1 Comment »


big data

Top Business Analysts in the Region to Gather in Dubai to Discuss the Economics of Big Data & Analytics

January 22, 2015

On 8 February this year, Caxton Group will host yet another highly interactive technology workshop in Dubai, UAE, that will focus on the security and economic challenges of data and analytics. more »

Leave a response »


satellite mobile hotspot

007-Worthy Communication Anywhere in the World

January 22, 2015

It’s the middle of the night. more »

Leave a response »


chinese hackers

Chinese Spies Steal Australian Warplane Design – MWR InfoSecurity Comment

January 22, 2015

Following news that Chinese spies have reportedly stolen the designs for Australia’s new warplane, Andrew Mabbitt, Security Consultant at MWR InfoSecurity, has given the following comment. more »

Leave a response »


verizon

Verizon Email Vulnerability – Rapid7 Comment

January 21, 2015

Following the news of the Verizon email vulnerability, Trey Ford, Global Security Strategist at Rapid7 has provided the following comment. more »

Leave a response »


doxing

What Is Doxing? (And How to Avoid It)

January 21, 2015

Michel Foucault knew a thing or two about how control works through exposure. more »

Leave a response »


centcom

Cybersecurity: Lessons from the U.S. CENTCOM Twitter Hack

January 21, 2015

Individuals claiming to be with ISIS recently compromised the Twitter and YouTube accounts of US Central Command. more »

Leave a response »


game of hacks

Game of Hacks: Promoting Secure Coding Practices

January 21, 2015

Application security has become a huge challenge for IT companies worldwide. more »

Leave a response »

 

Welcome to Information Security Buzz

Information Security Buzz is an independent resource that provides the best blogs, opinions and news for the information security community. Collated from security experts and industry leaders, content is carefully selected to provide you with the latest threat trends, insights, practical solutions, hot topics and advice from around the globe. Get in touch and see how you can use our community as a catalyst to share your thoughts, views and to keep up to date with the latest news!

Email: infosec@informationsecuritybuzz.com or follow us on Facebook, Twitter & Google+ to find out more.