Please turn on your JavaScript for this page to function normally.
Developing countries are more willing to trade privacy for security

Microsoft has released the results of a global survey that tried to answer the question how people around the world see technology and how personal technology has changed …

Best practices to help prevent online data breaches

The Online Trust Alliance (OTA) recommended a series of best practices to help prevent online data breaches and other exploits. Leveraging preliminary year-end data from the …

Most top 500 Android mobile apps have security and privacy risks

After testing the top 500 Android applications, MetaIntell identified that approximately 460 of those 500 Android applications (available in apps stores such as Amazon, CNET, …

Top 10 DDoS attack trends

Prolexic Technologies, a provider of DDoS protection services, published its top 10 attack trends for 2013. Throughout the year, metrics were collected from all DDoS attacks …

ENISA: Industrial Control Systems require coordinated capability testing

EU’s cyber security Agency ENISA published a new report to give advice regarding the next steps towards coordinated testing of capability of the often outdated …

Companies must improve incident response plans

Security threats are imminent, but CEOs and other members of the management team are in the dark about potential cyber-attacks against their companies, say the results of a …

Explosive growth of advanced attacks and malicious traffic

The Cisco 2014 Annual Security Report, released today, reveals that threats designed to take advantage of users’ trust in systems, applications and personal networks …

Amazon and GoDaddy are the biggest malware hosters

The United States is the leading malware hosting nation, with 44 percent of all malware hosted domestically, according to Solutionary. The U.S. hosts approximately 5 times …

Security concerns are still holding back cloud adoption

There are significant differences in public cloud infrastructure concerns between the cloud-wise, organizations that are currently using cloud services, and the cloud-wary, …

Understanding mobile security pressure points and vulnerabilities

41 percent of the government employees who used the assessment tool are putting themselves and their agencies at risk with existing mobile device habits, according to a Mobile …

One in five SMB retailers lacks security fundamentals

Fortinet published new research that shows where SMB retailers stand in regards to compliance regulations, security policies and new technologies that help manage big data and …

Mass-scale cleansing of co-opted computing devices

Cyber criminals are infecting innocent victims’ computing devices with crimeware at an alarming rate and with enormous costs. Technology solutions alone have not worked …

Don't miss

Cybersecurity news