The weak link in a rusty chain
A company’s business stalls because of a cryptor. The head of IT dept is to solve the problem. But “solving” this time doesn’t mean just “restoring the data”.
7 articles
A company’s business stalls because of a cryptor. The head of IT dept is to solve the problem. But “solving” this time doesn’t mean just “restoring the data”.
We asked more than 3,000 representatives of small and medium-sized companies how they manage to cope with cryptomalware in the constantly changing landscape of cyberthreats.
A virus damaging hardware is one of the most widely believed myths in the infosec domain. And, at the same time, it’s the most non-standard one. And it’s not totally a myth, after all.
One of the most interesting ciphers designed to eliminate the vulnerability to symbol frequency analysis was the Vigenere cipher. Which later became the basis of unbreakable one-time pads.
2013 will be remembered by both security professionals and everyday people for the number of events that took place in information security. Various incidences, from Edward Snowden’s revelations to the
As Infosecurity Europe 2013 draws to a close, we take a look at the key takeaways, trending topics and buzzwords from this year’s event. To coincide with Infosec, Verizon released
Infosec 2013 kicked off in London in style yesterday, as Chloe Smith MP, Minister for Political and Constitutional Reform, gave the inaugural keynote session on the UK’s cyber security strategy