Please turn on your JavaScript for this page to function normally.
BYOD: Better stay used to it

BYOD is a common trend in organizations today. Businesses may be thrilled they don’t have to pay for tablets or smartphones for their workforce and don’t usually …

1 billion data records compromised in data breaches

More than 1,500 data breaches led to one billion data records compromised worldwide during 2014, according to Gemalto’s Breach Level Index (BLI). These numbers represent …

Week in review: Car hacking and hijacking, critical Windows flaws, and Forbes.com compromise

Here’s an overview of some of last week’s most interesting news, interviews and articles: Which kind of security professional are you? Since I became a part of the …

16 million mobile devices infected by malware

Security threats to mobile and residential devices and attacks on communications networks rose in 2014, threatening personal and corporate privacy and information. …

The limits of prevention-centric security programs

In an analysis of tens of thousands of malicious files, Damballa discovered that it can take more than six months for traditional AV tools to create signatures for 100% of the …

Phishing attacks increasingly target financial data

28.8 percent of phishing attacks last year aimed to steal financial data from consumers, according to a new report by Kaspersky Lab. The results show how cybercriminals have …

IT security training is a top priority for CIOs

CIOs are taking a multipronged approach to protecting sensitive company information, and the majority are currently taking or planning to take steps in the next 12 months to …

Increase in enterprise cloud adoption and data risk

Skyhigh Networks analyzed actual cloud usage data from over 15 million enterprise employees across 350 enterprises. Although they found a record high percentage of cloud …

A closer look at LepideAuditor Suite

Server systems are the pillars of an organization’s working environment, and they should be up and running at all times, without any interruptions. If a server crashes …

Dangerous vulnerabilities plague IoT home security systems

Owners of Internet-connected home security systems may not be the only ones monitoring their homes. A new HP study found that 100 percent of the studied devices used in home …

Majority of dating apps are open to hacks

IBM Security found that over 60% of leading Android dating mobile apps they studied are potentially vulnerable to a variety of cyber-attacks that put personal user information …

Are organizations ready for the embedded computing takeover?

It is bordering on cliché to acknowledge that the Internet is a double-edged sword. As time goes by, the statement takes on even greater significance, in light of its …

Don't miss

Cybersecurity news