Please turn on your JavaScript for this page to function normally.
Who is ultimately responsible for data security in the cloud?

A recent report following Infosecurity Europe 2014 suggested that 43 per cent of organisations had no enterprise visibility or control into whether employees were putting …

Cybercriminals exploit trusted app and service vulnerabilities

The manipulation of legitimate mobile apps and services played a key role in the expansion of mobile malware at the beginning of 2014. McAfee Labs found that 79 percent of …

Card fraud impacts 1 in 4 consumers worldwide

A global fraud study of more than 6,100 consumers across 20 countries revealed that one in four consumers is a victim of card fraud in the last five years. The study, …

Hackers to attack routers at DEF CON

A competition is scheduled for hackers and computer scientists from around the world to better protect consumers against widespread security vulnerabilities in wireless …

Key Internet of Things privacy and security issues

Independently administered throughout 11 countries, a new Fortinet survey gives a global perspective about the Internet of Things, what security and privacy issues are in …

Spammers increasingly targeting Montreal

AdaptiveMobile released data that shows a marked increase in SMS spam across Canada in the past six months. The higher volume of SMS spam comes on the eve of the July 1st …

Quarter of all UK attacks target web services and applications

A comprehensive analysis of security alerts in 2013 reveals that a quarter of all attacks in the UK were application specific attacks or targeted at web applications. This is …

Improving transaction security for financial institutions

Mobile technology is changing the way we conduct financial transactions. With more and more consumers relying on mobile technology to perform everyday activities, the mobile …

Week in review: GCHQ intercepts Google, Facebook users’ communications, Code Spaces destroyed by extortion hack attack

Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Five great computer security tips that few people follow Here …

Are your third-party vendors leaving the door open to hackers?

By now, every security professional in the world should know the story about Fazio Mechanical Services. The Pennsylvania-based company specializes in heating, air conditioning …

Demand for PaaS on the rise

A new age of Develop Your Own Application (DYOA) to meet ever-changing business requirements is driving demand for rapid application development Platform-as-a-Service (PaaS) …

The future of cloud computing

North Bridge Venture Partners, in conjunction with Gigaom Research and 72 collaborating organizations, today released results for its Future of Cloud Computing survey. This …

Don't miss

Cybersecurity news