The top cybersecurity threats in 2013 reportedly included hacktivists targeting users’ privacy at the top spot, followed by cyberespionage campaigns – along with the newest craze of stealing bitcoins.
A cybersecurity framework for critical infrastructure owners will soon become a national standard for litigators and regulators. The framework is now in its final comment stage and will be released mid-February. The National Institute of Standards and Testing (NIST) will establish this comprehensive set of cybersecurity practices – which will be voluntary but legally binding in a court of law.
If you’re an Android user — or want to be — you’ve likely heard about all the security risks of Google’s mobile operating system. But how real are these threats, and how much damage can they do? Despite the fears, are Android devices actually a safe bet for an enterprise mobility strategy?
These are key questions for any organization thinking about a broad Android rollout or even simple acceptance of Android devices in a BYOD context. The answers may not be what you expect.
By harnessing the unpredictable nature of matter at the quantum level, physicists have figured out a way to exchange information on secret keys.
Revelations show a transatlantic intelligence pact that started during the second world war is expanding beyond states’ ability to control it.
There haven’t been too many moments of levity over the past four months for those intimately involved in the story of Edward Snowden. It hasn’t been a laughing matter for the man himself, who is now stuck in Russia, the intelligence agencies whose secrets he has disclosed, or the governments that have had to deal with the consequences.
But the impasse between the opposing forces in this unprecedented and complex saga has been broken on occasion. One of these moments came at the Guardian’s London headquarters, near King’s Cross station, on Wednesday 17 July.
Continue by here – from The Guardian