No person has the cosmic power to predict the next waves in network securities. Still, every industry in network security will do their best just assess the risks and impact of cyber threats to every Internet user. It is a necessity because it is important to be ahead in mounting the right defenses against the onslaught of cyber criminals. Perhaps, the only reason that provides great troubles to...
Are We Ready for Cyber Warfare?
With the cyber gateway continuously expanding, threats to our security could happen almost anywhere. One way to improve our security is through incident handling.
Google Releases Chrome 13, Addresses 30 Vulnerabilities
Recently, Google released Chrome 13. Chrome 13 Renders Instant Search Results, offers Print Preview and Improves Omnibox Feature.
Computer Security Professionals Detect Malware
Security professionals have alerted users on malware infested hardware devices in circulation.
Department of Defense Puts forward New Rule to Safeguard Unclassified Data
Recently, U.S Department of Defense (DOD) proposed changes to defense acquisition regulations for safeguarding unclassified information related to the department.
Security Professionals Identify Phishing Scam on Microblogging site
Recently, security researchers identified a new phishing scam circulating on the microblogging site Twitter.
Pacific Northwest National Laboratory Faces Cyber-attack
Recently, Pacific Northwest National Laboratory (PNNL) suffered massive cyber-attack.
Internet Security Researchers Alert Users of New Facebook Phishing Scam
Recently, security researchers identified a new phishing scam targeting Facebook users.
Cyber Attackers Expose Data related to Viacom, Universal Music and Several Government Websites
Recently, cyber-attackers exposed data pertaining to Viacom, Universal Music and several government websites.
Computer Forensics Experts Probe Cyber-attack on Gannett Government Media Websites
Recently, various websites of Gannett Government Media Corporation suffered cyber-attacks resulting in disruption of access to users and compromise of user data.