Developing countries are more willing to trade privacy for security
Microsoft has released the results of a global survey that tried to answer the question how people around the world see technology and how personal technology has changed …
Best practices to help prevent online data breaches
The Online Trust Alliance (OTA) recommended a series of best practices to help prevent online data breaches and other exploits. Leveraging preliminary year-end data from the …
Most top 500 Android mobile apps have security and privacy risks
After testing the top 500 Android applications, MetaIntell identified that approximately 460 of those 500 Android applications (available in apps stores such as Amazon, CNET, …
Top 10 DDoS attack trends
Prolexic Technologies, a provider of DDoS protection services, published its top 10 attack trends for 2013. Throughout the year, metrics were collected from all DDoS attacks …
ENISA: Industrial Control Systems require coordinated capability testing
EU’s cyber security Agency ENISA published a new report to give advice regarding the next steps towards coordinated testing of capability of the often outdated …
Companies must improve incident response plans
Security threats are imminent, but CEOs and other members of the management team are in the dark about potential cyber-attacks against their companies, say the results of a …
Explosive growth of advanced attacks and malicious traffic
The Cisco 2014 Annual Security Report, released today, reveals that threats designed to take advantage of users’ trust in systems, applications and personal networks …
Amazon and GoDaddy are the biggest malware hosters
The United States is the leading malware hosting nation, with 44 percent of all malware hosted domestically, according to Solutionary. The U.S. hosts approximately 5 times …
Security concerns are still holding back cloud adoption
There are significant differences in public cloud infrastructure concerns between the cloud-wise, organizations that are currently using cloud services, and the cloud-wary, …
Understanding mobile security pressure points and vulnerabilities
41 percent of the government employees who used the assessment tool are putting themselves and their agencies at risk with existing mobile device habits, according to a Mobile …
One in five SMB retailers lacks security fundamentals
Fortinet published new research that shows where SMB retailers stand in regards to compliance regulations, security policies and new technologies that help manage big data and …
Mass-scale cleansing of co-opted computing devices
Cyber criminals are infecting innocent victims’ computing devices with crimeware at an alarming rate and with enormous costs. Technology solutions alone have not worked …
Featured news
Resources
Don't miss
- Banshee Stealer variant targets Russian-speaking macOS users
- Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
- GitLab CISO on proactive monitoring and metrics for DevSecOps success
- Sara: Open-source RouterOS security inspector
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd