Please turn on your JavaScript for this page to function normally.
Most visits to a login page are made by malicious tools

Incapsula surveyed 1,000 websites over a 90-day period, during which we recorded over 1.4 million unauthenticated access attempts and 20,376 authenticated logins. Their data …

Most users don’t trust app developers with their data

Research by ISACA shows that, of 1,000 employed consumers surveyed in the UK, only 4% named the makers of their mobile phone apps as the entity they most trust with their …

Most organizations unafraid of phishing

ThreatSim released its 2013 State of the Phish Awareness Index, gauging phishing training, awareness and readiness among 300 IT executives, administrators and professionals in …

Twitter abuse trends and stats

When it comes to Twitter, people still have a large appetite for having a large number of fake followers in order to seem more popular. Fraudsters are cashing in on this in a …

Security misconceptions among small businesses

More than 1,000 SMBs participated in a joint McAfee and Office Depot survey last month, and the majority (66 percent) felt confident that their data and devices are secure and …

Retail sector slow in adopting new PCI standards

Tripwire announced the results of research on risk-based security management in the retail industry, and the news isn’t good: the majority of the retail sector is yet to …

Women crucial for taking infosec industry to next level

Women represent only 11 percent of the information security workforce yet they have the academic background and diverse perspective necessary to accelerate change in the …

93% of firms increasing cyber-security investments

93% of companies globally are maintaining or increasing their investment in cyber-security to combat the ever increasing threat from cyber-attacks, according to a new survey …

Cost of fraud and online disruption

Cyber Monday represents an average 55 percent surge in daily online / mobile retail revenues, says a new study by RSA and the Ponemon Institute, and a corresponding surge in …

Traditional security models becoming exhausted

The Nexus of Forces is transforming the approach towards information security as new requirements are brought about by social, mobile, cloud and information. Gartner predicts …

IPS still mainly deployed at the perimeter, doing a good job

SANS announced the results of a new survey on network security sponsored by HP. 439 survey responses show that IPS is still mainly deployed at the perimeter and is doing a …

Exploring the dangers of a mobile lifestyle

We live in an increasingly digital world, and rely on the devices we use to store our more or less valuable information and to perform critical tasks. In fact, according to a …

Don't miss

Cybersecurity news