GDOL website may also have been hacked
THE government’s Office of Technology is aware of three GovGuam websites that have been compromised within the past week, according to Wil Castro, special assistant to the governor. In additionLEER MÁS
Noticias de seguridad informática | Tutoriales de seguridad informática
THE government’s Office of Technology is aware of three GovGuam websites that have been compromised within the past week, according to Wil Castro, special assistant to the governor. In additionLEER MÁS
Microsoft today issued an emergency patch for a severe security hole in all supported versions of Windows Server which allows attackers to create administrator accounts and gain full access toLEER MÁS
The KKK threatened to use lethal force against Ferguson protesters;Anonymous successfully retaliated against Ku Klux Klan’s Ferguson threats by taking over two primary Twitter accounts, keeping KKK websites offline andLEER MÁS
A number of websites of the Goa government have allegedly been hacked. However, no formal complaint has been lodged with the cyber crime police in this connection. According to reports,LEER MÁS
Welcome to Cyber Security World Conference 2014 where renowned information security authorities and innovative service providers will bring their latest thinking to hundreds of senior executives focused on protecting today’sLEER MÁS
Even as the threat landscape for cyber-attacks is expanding on a rapid scale, about one-third organisations in India have no real-time insight on cyber-risks necessary to combat these threats, aLEER MÁS
The famous Turkish hacker team ‘Redhack’ announced hacking into power administration system and canceling 1.5 million liras (approx. 650K US dollars) of electricity bills to be paid to Soma ElectricityLEER MÁS
Reports from Associated Press reveal that the State Department has closed down its email system following a security attack. The news comes after the details of a hack attack onLEER MÁS
Nadie está libre de usar contraseñas poco robustas (ni los hackers). La idea de tener una palabra compleja, recordable y diferente para cada lugar en que necesitas ingresar una contraseñaLEER MÁS
Keeping up with the latest cyber-threats, including new forms of malware, and gaining insight on which systems are adequately protected from threats all make the list of the top securityLEER MÁS