Security

BitWhisper turns up heat on air-gap security

Ben Gurion University reported Monday that researcher Mordechai Guri, assisted by Matan Munitz and guided by Prof. Yuval Elovici, uncovered a way to breach air-gapped systems—that's quite something considering that air-gapped ...

Security

Researcher at security event shows smart TV attack

(Tech Xplore)—Smart TVs vulnerable to hacks? That is no longer a question but an answer, for researcher Rafael Scheel, with Oneconsult, a cyber security consulting company.

Security

What to do if your identity was stolen in mass identity breach

News recently that a malware attack at Detroit-based Wolverine Solutions Group, which handles mailing and other services for hundreds of health care companies, potentially exposed the personal information of hundreds of thousands ...

Marriott data breach: 500 million times concerned

On November 30, 2018, Marriott International announced an enormous data breach concerning 500 million clients, the second biggest ever. With new data breaches being announced almost daily, you have to ask yourself, how is ...

Security

Vital infrastructures in the Netherlands vulnerable to hackers

Don't treat vital infrastructures in the same way one would protect a shop network, for instance, but bind them to a secure circuit that hackers cannot breach. This is one of the central recommendations in a comprehensive ...

Security

Phishing scams are becoming ever more sophisticated

Companies are bombarded with phishing scams every day. In a recent survey of more than 500 cyber security professionals across the world, 76% reported that their organisation fell victim to a phishing attack in 2016.

page 1 from 2

Computer security

Computer security is a branch of technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users.

This text uses material from Wikipedia, licensed under CC BY-SA