2015 predictions: Cyber attacks aimed at critical infrastructure, Attacks as a Service
In 2014, we witnessed the rise of POS malware and ransomware, more targeted, advanced evasion by both cyber crooks and hackers backed by nation states, and government grade …
Data loss and downtime costs enterprises $1.7 trillion
Data loss and downtime cost enterprises $1.7 trillion in the last twelve months, or the equivalent of nearly 50% of Germany’s GDP. Data loss is up by 400% since 2012 …
Cost savings drive businesses to the cloud
A survey of C-Level senior executives, developers and other industry delegates has found that 72% of respondents identified cost as the key benefit of using the cloud for the …
Cyber attacks impact purchasing behavior
As U.S. consumers head to malls and retail websites this holiday season, they do so increasingly concerned about the safety and security of their personal information. In …
Online shoppers are easily duped
A survey by One Poll and Dimensional Research on holiday shopping security practices evaluated online cybersecurity awareness of 2,011 consumers from the U.S. and U.K., and …
Most people don’t feel safe when shopping online
Most consumers do not feel safe when shopping online and many are shying away from their favorite retailers as a result, according to the NCC Group. According to the …
The rise of account takeovers
Account takeover fraud is the primary means of attack from fraudsters and attack origins occurring predominantly outside of the U.S., according to NuData Security. Account …
SaaS deployments are now mission critical
Global buyers of cloud applications cite cost, innovation and agility as reasons for adoption. In May and June 2014, Gartner conducted a survey across 10 countries in four …
Examining 1 billion transactions for fraud
ThreatMetrix analyzed nearly one billion transactions and is able to provide a representative summary of activity including account creation, payment and login fraud across …
8 cybercrime trends that will shape IT
Cybersecurity created headlines and headaches in 2014, with large-scale data breaches at retail chains, attacks on data stored in the cloud and massive vulnerabilities …
Most IT pros prefer open source to proprietary software
Business continuity and control eclipse cost savings are the top reasons why U.S. IT professionals prefer open source to proprietary software. According to a Ponemon Institute …
320 breaches reported between July and September
Consumers experienced a wide range of data privacy and security threats in the third quarter of 2014 as hackers successfully conducted large-scale attacks against financial …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users