
Defend encrypted data from quantum computer threat
If an exotic quantum computer is invented that could break the codes we depend on to protect confidential electronic…
If an exotic quantum computer is invented that could break the codes we depend on to protect confidential electronic…
What CISOs want in 2016 The role of the Chief Information Security Officer (CISO) has developed rapidly over recent…
Business secrets could be at risk, after researchers discovered a worrying number of developers were posting access credentials for…
Researchers discovered a severe cross-domain authentication bypass vulnerability that could have been exploited by malicious actors to gain access…
There is no love lost between the people who write malware and the anti-virus companies who work hard to…
Security collaboration has, and still is, generating lots of attention: How can we join forces and use crowd intelligence…
ISIS-linked hackers have targeted about 3,000 ordinary New Yorkers in a cyberattack, posting their personal information online and announcing,…
Online classifieds site Gumtree Australia has been hacked, with some account holders receiving an email alert informing them of…
Conducting a DDoS attack used to require a significant amount of talent. But today, a high school student with…
Information security firm High-Tech Bridge has launched a new free service to help web site owners and businesses understand…