Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » SECURITY INFORMATICS (Page 3)

Confidential Video Conferences are used by Intelligence Services to spy.

Confidential Video Conferences are used by Intelligence Services to spy.

Tens of thousands of video conferencing setups in corporate meeting rooms where the most confidential information is discussed, are vulnerable to spying attacks, researchers said this week to Computerworld. After…

Hacking your mobile just by dialing the number.

Hacking your mobile just by dialing the number.

It is not difficult to hack into your mobile phone just by dialing the number. The hacker can remotely listen to your mobile calls, read your mobile text messages, take…

Cyber security: a new cold war, or rather code war affects the world.

Cyber security: a new cold war, or rather code war affects the world.

A new cold war, or rather code war, started to grip the whole globe during 2011. Cyber espionage is real and present danger for every form of organisation, like UK…

“The threat of Chinese cyberwarriors against UK business cannot be ignored” said top military expert in London.

“The threat of Chinese cyberwarriors against UK business cannot be ignored” said top military expert in London.

January 26th – International information security expert Lieutenant Colonel (Ret’d) William Hagestad II is today warning British businesses could fall victim to cyberattacks from mainland China unless they improve their…

NATO trend? Pentagon defense computers tied to the cloud.

NATO trend? Pentagon defense computers tied to the cloud.

U.S. is downsizing its Armed Forces. 7000 american soldiers withdrawing from Europe. Cyber “cold” warfare is a fact.  To defend the U.S. military’s information assets, Pentagon leaders say defense computers…

New technique into quantum cryptography system in Norway.

New technique into quantum cryptography system in Norway.

December 26, 2011.- In Norway a new technique that exploits imperfections in quantum cryptography systems has been developed and tested by the Norwegian University of Science and Technology (NTNU), the…

European Internet Usage Report shows East and South still far behind.

European Internet Usage Report shows East and South still far behind.

  Eurostat, the statistical office of the European Union, published a report with data on Information and Communication Technologies (ICT) usage in households and by individuals in the European Union…

Facebook´s IPO could exceed market value of Google.

Facebook´s IPO could exceed market value of Google.

The world’s No. 1 online social network –Facebook– prepares for a blockbuster initial public offering IPO to be launched at NASDAQ stock market. The market debut of Facebook in 2012…

London Police Report blame budget cuts for loosing control of riots.

London Police Report blame budget cuts for loosing control of riots.

London Police fighting the riots had to use their own mobile phones during the August riots after they experienced “significant difficulties” with their communication equipment and some forces lost control…

London Police interacting with march public via Twitter and Internet TV Live Feed.

London Police interacting with march public via Twitter and Internet TV Live Feed.

The Metropolitan Police Service in London is today launching two new social media tools during the London march and rally for the national day of industrial action. This feed is an…