Please turn on your JavaScript for this page to function normally.
A decade of vulnerabilities and predictions for 2012

Since 2001, Spanish security firm S21sec has been been compiling a database of vulnerabilities detected by themselves and those reported by a great number of sources which …

A new security strategy for Sony

2011 was a tough year for Sony. Having been attacked over 20 times by hacktivists going after its websites, the PlayStation Network, its customers’ and company …

Locate and analyze deployed digital certificates for free

Venafi announced the availability of Venafi Assessor, a downloadable, easy-to-install, free software solution that scans an organization ‘s network to locate and analyze …

The future of attacks on banking systems

If you’re a regular reader of our news site – or, indeed, any other that site that deals with information and computer security – you might sometimes get the …

Employees are deliberately disabling security controls

Corporate mobile devices and the bring-your-own-device (BYOD) phenomenon are rapidly circumventing enterprise security and policies, say the results of a new global study …

Most executives don’t pay attention to cyber risks

The advanced findings from the latest 2012 Carnegie Mellon CyLab Governance survey of how corporate boards and executives are managing cyber risks reveals the issue is still …

Only 34% of businesses enforce encryption on removable devices

Imation revealed the results of a recent survey of 302 IT decision makers in the US and Canada, which say that 37 percent of them reported that their business had …

Log management deserves a company’s respect

Keeping and maintaining data logs is a corporate best practice and, in many cases, when you consider regulation and industry standards, it’s the law. Still, few …

Self-selected PINs aren’t that hard to guess

Four-digit banking PINs are usually randomly assigned by banks after the issuing of credit and debit cards, but there are still some out there that let its customers choose …

The escalating cost of US cybersecurity plans

When US President Barack Obama called on the Congress for laws that would protect the country’s citizens, businesses and infrastructure from various cyber threats, it …

Privacy pitfalls of online dating

It used to be that you were pretty much anonymous on the Internet if you chose to be, but those halcyon days are now gone, and you should think about whether it’s safe …

Smaller DDoS attacks can be deadlier than big ones

Contrary to conventional thinking that large bandwidth cyber attacks wreak the most damage on enterprises, security experts at Radware instead found that bigger problems …

Don't miss

Cybersecurity news