Security Article – Page 13 – DCG 62231
Ilustrasi Hack - Google
Security Article

How to Avoid a Hacktivist Attack

Last year saw a massive surge in hacktivism – hacking motivated by political and social objectives – according to Verizon’s 2012 Data Breach Investigations Report [PDF file]. The report attributed fully 58 percent of all data stolen, more than 100 million records, to hacktivists. “The most significant change we saw in 2011 was the rise of ‘hacktivism’ against

Security Article

Laptop Security: The First Line of Defense

White Papers – Laptop Security: The First Line of Defense – By Kensington Companies invest millions of dollars in computer security solutions, from sophisticated antivirus toolkits to round-the-clock threat-monitoring software. Yet, all too often, businesses focus on enterprise-wide security initiatives rather than on protecting one-time purchases such as laptop computers. Security accessories for portable devices often