The Latest in IT Security

Posts Tagged ‘sensitive data’

The air gap or air wall technique implies isolating one or more computers from unsecured networks. It can be implemented physically or theoretically, in the second case the isolation being realized only at a cryptographic level. Used in order to protect classified information, payment networks and control systems that operate critical infrastructure (or by privacy […]

Read more ...

The hackers stole gigabytes of sensitive data, though it’s not clear whether the attacks were aimed at financial gain or cyber espionage.

Read more ...

A computer intrusion perpetrated on the systems of JP Morgan Chase financial organization lost the company gigabytes of sensitive data. According to sources close to the investigation, the incident seems to have a foreign government behind it, since the complexity of breaching the systems is far from being common to financial cybercriminals. However, it appears […]

Read more ...




[catlist id=13 orderby=date order=desc numberposts=2]


Latest Comments

Social Networks

[catlist id=5302orderby=date order=desc numberposts=2]