Quantcast
Channel: IRM Secure BLOG » confidential information
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Cyber-Crime in Ghana

It is said that an idle hand will find something to do, good or evil. Cyber-crime is the crime committed on the internet, whereby people create a spam or fake message and send unsolicited messages to...

View Article



Image may be NSFW.
Clik here to view.

NSA Hunger Demands 29 Petabytes Of Data A Day

  As the National Security Agency (NSA) spying furore rumbles on, the agency has claimed to be looking at only 0.00004 percent of the world’s total internet traffic. In a document (PDF) on the nsa.gov...

View Article

Image may be NSFW.
Clik here to view.

Prioritizing Vulnerability Prioritization

For many victims of an information security breach, prioritization of vulnerabilities becomes an act forced upon them a priori. “Ooops, that one was serious, we should have prioritized it!”, is the...

View Article

Image may be NSFW.
Clik here to view.

Breach Prevention: Eight Key Steps

Breaches are expensive, embarrassing and entice additional scrutiny from regulators and consumers alike. By taking some fundamental measures, you can help protect private information and lessen the...

View Article

Image may be NSFW.
Clik here to view.

Department of Energy Hacked

  Malicious hackers have broken into computer systems of the U.S. Department of Energy (DOE) to hijack sensitive personally information (PII) for about 14,000 past and current employees. In a brief...

View Article


Image may be NSFW.
Clik here to view.

U.S. Defense Contractor Suffers From Data Breach

U.S. defense contractor sustains data breach. Employees for and applicants to the linguist program of Virginia-based defense contractor Northrop Grumman may have had their sensitive information...

View Article

Image may be NSFW.
Clik here to view.

Department of Energy Hacked Again

The United States Department of Energy notified employees via an email Wednesday that hackers gained personal information, such as names and social security numbers, of 14,000 current and former agency...

View Article

Image may be NSFW.
Clik here to view.

Breach Prevention: 8 Key Steps

Breaches are expensive, embarrassing and entice additional scrutiny from regulators and consumers alike. By taking some fundamental measures, you can help protect private information and lessen the...

View Article


Image may be NSFW.
Clik here to view.

Unprecedented ‘Black Budget’ Leak

Unprecedented ‘black budget’ leak reveals the scope of $52 billion US spy complex. Former NSA contractor Edward Snowden has leaked documents that map out a $52.6 billion budget for the NSA, CIA, and...

View Article


Image may be NSFW.
Clik here to view.

India govt reportedly monitors Web activities, without ISP knowledge

India govt reportedly monitors Web activities, without ISP knowledge Summary: Indian government said to have deployed Lawful Intercept and Monitoring systems to track Internet activities of citizens,...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images