Please turn on your JavaScript for this page to function normally.
A historical overview of the cyberattack landscape

Over the past 16 years, sensitive data and the complex IT infrastructure within Global 2000 enterprises used to create, distribute, and protect it has grown exponentially. …

The rise of sophisticated malware

A recent Enterprise Strategy Group (ESG) research study focused on advanced malware protection and detection. The study revealed that enterprise organizations are seeing an …

Executives lack confidence in their cyber security

More than two-thirds of executives are concerned their companies will not be able to stop such threats, and one in five say their biggest concern is not knowing whether an …

72% can’t securely manage multiple computing environments

AppSense and CTOVision announced the results of a survey that included responses from 245 executives, technologists and contractors – across the defense, intelligence …

Increase in malicious DNS request traffic

With regard to the OpUSA hacktivist campaign, Solutionary discovered that attackers responsible for previous DDoS attacks on the financial sector leveraged a variety of …

U.S. the number one source of web attacks

Retailers suffer twice as many SQL injection attacks as other industries, according to Imperva. Additionally, these attacks were more intense, both in terms of number of …

Study connects cybercrime to job loss

After years of guesswork and innumerable attempts to quantify the costly effects of cybercrime on the U.S. and world economies, McAfee engaged the Center for Strategic and …

DDoS attacks are getting bigger, stronger and longer

Prolexic Technologies announced that the average packet-per-second (pps) rate reached 47.4 Mpps and the average bandwidth reached 49.24 Gbps based on data collected in Q2 2013 …

Social engineering tops list of help desk security threats

Help desks are most commonly asked to assist users in addressing common IT problems including password resets and application and connectivity issues. Often the performance of …

Vendors patch security vulnerabilities within 3 weeks

High-Tech Bridge Security Research Lab released its statistics on web application security for the first half of 2013. The statistics is based on HTB Security Advisories that …

US retains spamming crown

Sophos has published the latest ‘Dirty Dozen’ of spam relaying countries, covering the second quarter of 2013. As the US retains the top spot among spam-relaying …

Email security: Perception vs. reality

When it comes to email security in the workplace, 98 percent of employees believe they demonstrate either equally secure or more secure behaviors than their colleagues. …

Don't miss

Cybersecurity news