Please turn on your JavaScript for this page to function normally.
Examining 1 billion transactions for fraud

ThreatMetrix analyzed nearly one billion transactions and is able to provide a representative summary of activity including account creation, payment and login fraud across …

Users of Remote Access Trojans arrested in Europe

Europol and several law enforcement and judicial authorities carried out an action against EU citizens, mainly teenagers and young adults, who are suspected of using remote …

User behavior intelligence in the expanding supply chain

The Internet has dramatically increased the speed of commerce across the globe. Today, the interconnectedness of various businesses facilitates just-in-time manufacturing, …

ITIL and ISO 20000 problem management

Remember this situation? You’re running Windows. The blue screen forces you to reboot your PC. And then it happens again. Incident Management = reboot your PC. And your …

Using company devices for personal activities leads to data loss

GFI Software released the findings of an independent study into how workers use company provided computers and laptops for personal activities, and the direct impact that …

6 tips for protecting your Internet-connected devices

While Internet-connected devices are our window on the world, we don’t realize that for cybercriminals it could be their window into ours if we don’t secure our …

Financial services cyber trends for 2015

If 2014 was the “year of the breach,” then what future cybersecurity threats await us? What’s the next mode of attack, and how much worse will it be? …

OpenDNS and IRISSCERT partner to fight security threats

OpenDNS announced a partnership with the Irish Reporting and Information Security Service (IRISSCERT), to provide threat intelligence about new and emerging threats. IRISSCERT …

Thousands fall for Free Audi R8 Facebook scam

Over 200,000 Facebook users have so far fallen prey to a like-farming scam promising two free Audi R8 cars, and thousands are joining the victim list each hour, according to …

8 cybercrime trends that will shape IT

Cybersecurity created headlines and headaches in 2014, with large-scale data breaches at retail chains, attacks on data stored in the cloud and massive vulnerabilities …

Most IT pros prefer open source to proprietary software

Business continuity and control eclipse cost savings are the top reasons why U.S. IT professionals prefer open source to proprietary software. According to a Ponemon Institute …

Whitepaper: Zero Trust approach to network security

NOTE: This whitepaper is no longer available, thanks for your interest. Zero Trust is an alternative security model that addresses the shortcomings of failing …

Don't miss

Cybersecurity news