Security is no fiction: Infosec on TV, film—and in space
Security is no fiction
23 Sep | View galleries
Roses are red, violets are blue, hackers will hack, and now they know you.
More than a third of reported Australian data breaches are due to human error, the Office of the Australian Information Commissioner (OAIC) has revealed as it released its first full-quarter statistical report about the functioning of the new Notifiable Data Breaches (NDB) scheme.
David Braue | 31 Jul | Read more
Hackers stole data of more than 150 million users of a wildly popular fitness and dietary tracking app MyFitnessPal, as announced by its parent company Under Armour on Thursday, March 29.
Harold Kilpatrick | 09 Apr | Read more
Dr Charlie Miller has been tagged as one of the world's best hackers after compromising a Jeep Cherokee from 10km with his colleague Chris Valasek.
Anthony Caruana | 13 Oct | Read more
UK's guidance for smart car makers encourages defence-in-depth, encryption, and software updates.
Every time there's an election, the topic of hacking one comes to the surface. During a presidential election, that conversation gets louder. Yet, even the elections held every two years see some sort of vote hacking coverage. But can you really hack an election? Maybe, but that depends on your goals.
Steve Ragan | 05 Oct | Read more
Here’s how to find out if your child is involved in malicious online activity -- before the authorities do
Roger A. Grimes | 05 Jul | Read more
"Hunting is not a sport. In a sport, both sides should know they're in the game." - According to Field and Stream magazine, this is an oft quoted hunting expression. I couldn’t resist the irony of applying this quote to the cyber security industry where hunting is indeed a sport. The good guys and the bad guys both know that they are in the game.
Kacy Zurkus | 12 May | Read more
What’s keeping CIOs awake at night? From data breaches to social engineering, there’s plenty to keep tech types tossing and turning.
Jen A. Miller | 25 Apr | Read more
It sounds like the operating system that really needs some serious security patches is the human one.
Taylor Armerding | 14 Oct | Read more
With technology supply chains rapidly evolving to all corners of the globe, doors continually open for unsavoury elements to find new ways to take advantage. Whether for personal gain, monetary gain, criminal activity, espionage, or military threat, black hats keep unearthing opportunities to exploit supply chain vulnerabilities.