Employees take too many risks with Wi-Fi security
UK employees are potentially putting their companies at risk of cyber-attack when using mobile devices for work purposes while on holiday or on a short break, new research has …
Could you maintain security in event of IT failure?
A study investigating the priorities for the UK and Ireland’s top banks and insurance companies has revealed low confidence in the ability to remain secure in the event …
One-third of cyber attacks take hours to detect
More than one-third of cyber attacks take hours to detect. Even more alarming, resolving breaches takes days, weeks, and in some cases, even months. Despite increased resource …
The privacy attitudes of 15,000 consumers from 15 countries
Spanning 15 countries and 15,000 consumers, the the EMC Privacy Index reveals consumers hold viewpoints on privacy that vary widely by geography and the type of activity …
What’s the leading cause of data loss?
HDD crashes more than doubled in the last four years, prevailing as the most common cause of data loss according to customer data provided by Kroll Ontrack. When asked about …
Advanced cyber attacks rely on privileged credential exploitation
While new and sophisticated malware variants were continually developed to exploit systems in 2013, criminals, hacktivists and advanced attacks continue to do the most damage …
Life after TrueCrypt
While speculation continues around the fate of popular disk encryption software TrueCrypt, Sophos conducted a survey of over 100 IT professionals regarding their use of …
Top 10 most trustworthy online retailers
The Online Trust Alliance (OTA) announced today the results of its 2014 Online Trust Audit. Out of nearly 800 top consumer websites evaluated, 30.2 percent made the Honor …
Mobile apps will have a significant impact on information infrastructure
With digital business blurring the line between the physical and the digital worlds, consumer-centric mobile apps are playing an important role, according to Gartner. Gartner …
Security at higher education institutions
SANS announces results of its inaugural survey of security in institutions of higher education, in which nearly 300 higher education IT professionals answered questions about …
Retail breaches and the SQL injection threat
Continuous monitoring of database networks is the best approach to avoid breaches such as the high-profile attacks against major U.S. retailers, according to a Ponemon …
Businesses are not ready for PCI DSS 3.0
Many U.S. businesses are unprepared for the Payment Card Industry Data Security Standard 3.0, or PCI DSS 3.0, as issued by the Payment Card Industry Security Standards …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users