Mobile threats around the world
2013 was a year of change in the world of mobile threats. Campaigns became increasingly targeted as criminals adapted their practices to maximize profit and operate under the …
96 percent of apps have security vulnerabilities
Improvements in patch deployment and secure coding practices have made a slight impact on the incidence of vulnerabilities, according to a new Cenzic report. However, the …
60% of enterprises relying on sysadmins to self-police SSH keys
Enterprises tolerate security vulnerabilities by allowing open door, root-level access, according to a new Ponemon Institute report. 46% of the 1,854 respondents reported …
400 iOS and Android apps analyzed for privacy and security risks
A new report analyzes the behaviors of the top 400 iOS and Android apps to assess the state of mobile app security and identify trends impacting consumers and enterprises with …
Lessons learned from blocking 100 million cyber attacks
Using real-life data from the 100m+ malicious hack attempts FireHost blocked in the last 12 months, they produced a Superfecta report which contains a quarter-by-quarter guide …
Malicious mobile apps on Google Play up 400 percent
RiskIQ announced research findings on the presence of malicious apps contained in the Google Play store. The company found that malicious apps have grown 388 percent from 2011 …
Epidemic of cyber attacks compromising healthcare organizations
The networks and Internet-connected devices of organizations in virtually every healthcare category — from hospitals to insurance carriers to pharmaceutical companies — have …
US businesses suffered 666,000 internal security breaches
Over 666,000 internal security breaches took place in US businesses in the last 12 months, an average of 2,560 per working day, new research has revealed. The findings, …
Most security pros concerned about missing threats between vulnerability scans
Continuous monitoring, whose roots lie with the U.S. government, addresses many of the challenges faced by traditional vulnerability management solutions and offers CISOs and …
Most organizations are unable to resolve a cyber attack
The lack of incident detection and investigation puts companies and their CISOs’ jobs at significant risk, according to a new Ponemon Institute study. In fact, when a …
Absolute Computrace anti-theft software can be remotely hijacked
Kaspersky Lab’s security research team published a report confirming and demonstrating that the weak implementation of anti-theft software marketed by Absolute Software …
Exposing the profitability of private data
Security breaches, cyber criminals, and organized attacks made it nearly impossible to keep personal and financial data private, according to Trend Micro. This annual report …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users