Please turn on your JavaScript for this page to function normally.
Organized cyber crooks plunder SMBs with simple, cheap keyloggers

The popularity and pervasiveness of Zeus/Zbot has made it almost a synonym for banking malware, but there are unfortunately many more types of malicious software that allow …

Do senior executives value information security?

Information security is low down on the list of risks to the business, according to NTT Com Security. The report, based on a survey of 800 senior business decision-makers (not …

Microsoft patches Windows, IE, Word, SharePoint and IIS

This month Microsoft is publishing 14 bulletins with new versions and patches for its software, operating systems and applications. This is one fewer bulletin than Microsoft …

Infosec industry: Time to put up or shut up

The information security industry is one of the most exciting industries to be involved in. It offers many opportunities to exercise one’s passion and curiosity about …

Many IT pros store compromising material on their mobile phones

It appears that Jennifer Lawrence is not the only one with risqué photos on her mobile device. According to a new survey from ESET, 39 percent of the UK’s leading IT …

Whitepaper: Still using proxies for URL filtering? There’s a better way

Firewalls enforce network access via a positive control model, where only specific traffic defined in policies is granted access to the network while all other traffic is …

Tips for a safe holiday season

Cyber scrooges leverage all types of digital devices, social media platforms and mobile apps to take advantage of consumers’ distraction during this festive and busy …

73% of organizations say BYOD increases security risks

Findings from a Kensington survey on the security risks created by BYOD policies in the enterprise show that 73 percent believe that BYOD represents greater security risks for …

First victims of the Stuxnet worm revealed

After analyzing more than 2,000 Stuxnet files collected over a two-year period, Kaspersky Lab can identify the first victims of the Stuxnet worm. After Stuxnet was discovered …

How cybercriminals scam consumers during the holiday season

McAfee announced its annual “12 Scams of the Holidays” list, which includes the most popular ways cybercriminals scam consumers during the holiday season as they …

Only 47% of IT pros are confident in their hardware configurations

Respondents of a new Tripwire survey were asked about the level of confidence they have in their application of foundational security controls, including hardware and software …

8 criteria to decide which ISO 27001 policies and procedures to write

If you’re just starting to implement ISO 27001 in your company, you’re probably in a dilemma as to how many documents you need to have, and whether to write …

Don't miss

Cybersecurity news