What do you make of accusations such as are quoted in this article on alleged Iranian hacking of infrastructure systems? http://thehackernews.com/2013/05/iranian-hackers-targeting-us-oil-gas.html
Holder Signed Off on Warrant Identifying Fox News Reporter as Criminal Conspirator | Threat Level | Wired.com http://feedly.com/k/ZjaOfp I think the question isn’t about obtaining the info in *some* cases as much as what review/controls are applied when that federal power is exercised. Thoughts?
Is cloud ready for business’ security concerns? Over Half Of Big Data & Cloud Projects Stall Because Of Security feedly.com/k/ZhkCXi
Bad news! New Android malware forwards incoming messages to hacker – The Hacker News feedly.com/k/18mEGYM
Hacking #BIOS opportunities #infosec Dark Reading – feedly.com/k/11gYxrX