Please turn on your JavaScript for this page to function normally.
USA still the global spam king

SophosLabs revealed the Dirty Dozen top spam-relaying nations, as it published the final “Spampionship” league table of 2013. Once again, it was the USA which …

By 2016, 30% of organizations will use biometric authentication on mobile devices

The consumerization of IT and business BYOD programs have resulted in potential security problems for IT leaders, according to Gartner. User expectations of a clean and simple …

Accreditation program strengthens global supply chain security

The Open Group launched the Open Trusted Technology Provider Standard (O-TTPS) Accreditation Program, aimed at assuring the integrity of commercial off-the-shelf (COTS) …

Top enterprise security threats identified

A new report from HP provides in-depth data and analysis around the most pressing security issues plaguing enterprises. It details factors that contributed most to the growing …

Security breaches, data loss and outages cost U.S. hospitals $1.6B

A new MeriTalk report, based on a survey of healthcare IT executives and underwritten by EMC, quantifies the organizational cost associated with security breaches, data loss, …

Dell releases secure, managed, ultra-mobile cloud access device

Dell announced Dell Wyse Cloud Connect, an ultra-compact and highly mobile cloud-access device that delivers desktop virtualization and personal cloud services to any HDMI- or …

Defending against drive-by downloads

In case you haven’t heard the term before, a drive-by download (DbD) is a class of cyber attack where you visit a booby-trapped web site and it automatically, and …

Week in review: Feds clone TorMail server, first Android bootkit, SpyEye creator pleads guilty

Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: Which e-commerce sites do more to protect your password? A …

Reactions to the Yahoo Mail hack

Unknown attackers have attempted to access a number of Yahoo Mail accounts and urged users to change their passwords even if they haven’t been affected. Here are some of …

Global view of attack traffic and security

Akamai released its latest report, which provides insight into key global statistics on attack traffic and security. Akamai maintains a distributed set of unadvertised agents …

Why governance and policy can strengthen compliance efforts

A colleague of mine recently made a joke and it made me pause to think. During our discussion on compliance and how internal policy can help organizations comply with external …

10,000+ UK systems affected by ICEPOL Trojan ransomware

At least 10,331 successful installs of ICEPOL Trojan ransomware took place in the UK last year. Bitdefender’s Cybercrime Investigation Unit analysed the disk images of …

Don't miss

Cybersecurity news