Please turn on your JavaScript for this page to function normally.
Android
158% increase in Android platform vulnerabilities

A new Quick Heal report reveals an increase in vulnerabilities on the Android platform, as well as a 33 percent rise in mobile ransomware. Researchers also found a slight …

BYOD
Employees rely largely on personally owned mobile devices in the workplace

Mobile device adoption in the workplace is not yet mature, found a recent survey from Gartner. Although 80 percent of workers surveyed received one or more corporate-issued …

escalator
McAfee Labs predicts 14 security developments for 2017

Intel Security released its McAfee Labs 2017 Threats Predictions Report, which identifies 14 threat trends to watch in 2017. “To change the rules of the game between attackers …

future
What will the data breach landscape look like in 2017?

While many companies have data breach preparedness on their radar, it takes constant vigilance to stay ahead of emerging threats and increasingly sophisticated cybercriminals, …

Business ideas
Five step approach to address data breaches, increase online trust

The Internet Society has released the findings from its 2016 Global Internet Report in which 59 percent of users admit they would likely not do business with a company which …

money online
SMBs will spend $564 billion on IT hardware, software, and services

IDC forecasts SMBs will spend $564 billion on IT hardware, software, and services, including business services, in 2016. This amount is expected to increase at a compound …

Users lock
Network security: A team sport for SMBs

The increased volume and frequency of cyberattacks has made information security an everyday issue of great importance, regardless of your geographical location, industry, …

shopping
Tips to shop safely on Cyber Monday

As consumers gear up for Cyber Monday, the largest online shopping day of the year, cybercriminals are also preparing to take advantage of deal-seekers. IBM X-Force …

Keyboard
Week in review: Locky spreading via Facebook, principles for efficient cyber investigations

Here’s an overview of some of last week’s most interesting news, podcasts and articles: Cobalt hackers executed massive, synchronized ATM heists across Europe, …

Fingbox
Fingbox: Network security and Wi-Fi troubleshooting

Fingbox allows you to secure and troubleshoot your home network. It plugs in to your existing router, alerting you when it senses anything out of the ordinary – from new …

London
UK organisations have a worrying digital security gap

UK organisations reveals that while 82 percent of C-Suite and senior managers admit they are concerned about the vulnerability of their web sites, mobile applications and …

Globe
Six key principles for efficient cyber investigations

Many organizations today are not equipped to defend against traditional cyberattacks, as demonstrated by the ever-increasing numbers of successful breaches reported daily – …

Don't miss

Cybersecurity news