The worst data disasters from 2015
What’s stronger than a speeding locomotive and can survive the heat of a fire? Data. The device that contains that data is a different story. Each year, Kroll Ontrack – which …
Mass adoption of mobile payment services derailed by security, privacy concerns
Evaluating the mobile payment preferences of 1,217 consumers from the U.S., a new Research Now survey revealed that 17 percent of respondents who did not make holiday …
Mobile users continue to put personal and corporate data at risk
Blancco Technology Group surveyed over 1,400 mobile users in the United States, Canada, UK and Australia, and found that inadequate security precautions taken by mobile users …
Cracks in the mobile ecosystem, Internet-connected devices
The interconnectivity of technology has led to a point where many devices are potentially vulnerable, and in the third quarter, the real world impacts of cyberattacks became …
Unsafe password policies leave shoppers vulnerable
Dashlane examined password security policies on 25 of the most popular online retailers. They tested 22 criteria, and each criterion was given a +/- point value that enabled a …
How businesses interpret and use threat intelligence
A new IDC study of 300 large UK companies found that: 96% of UK firms already use threat intelligence products and services; all of those surveyed intend to do so within the …
Data breaches and bots are driving cybercrime surge
From July to September, ThreatMetrix detected more than 90 million attempted attacks across industries, representing a 20 percent increase over the previous quarter. This …
Factors that influence breach costs
A variety of both positive and negative factors influence the expenses organizations incur as a result of breach, according to the SANS Institute. A lot of it depends on their …
The automation and industrialization of cyber attacks
A new Imperva report highlights cyber criminals’ use of automation to increase both the magnitude and velocity of attacks designed to compromise users and steal sensitive …
Endpoint security lags in spite of vulnerabilities
Endpoint security solutions today continue to lag, failing to provide adequate protection or detection against today’s security threats, according to Promisec. Survey results …
Long-term skills shortage drives tech salaries up
Four in 10 technologists changed jobs this year, according to the Harvey Nash Technology Survey. Respondents listed a good salary as their main motivator (77 percent) behind …
6.4 billion connected things will be in use in 2016
Gartner forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015, and will reach 20.8 billion by 2020. In 2016, 5.5 million new …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users