Users more worried about hacking than tracking
Internet users are highly concerned about the theft of personal and financial information and believe strongly that the federal government should do more to protect them, …
90-day spam campaign turns to Santa in December
Ninety days ago a substantial spam campaign focusing on dubious offers and fake prizes began, according to Commtouch. However since December 10, the campaign has been …
What’s the greatest security risk?
While boardrooms across the U.S. report growing prioritization of endpoint security, risk continues to grow and evolve and IT departments are racing to keep up, according to a …
How human behavior affects malware and defense measures
Installing computer security software, updating applications regularly and making sure not to open emails from unknown senders are just a few examples of ways to reduce the …
CIOs will continue to focus on business intelligence and analytics
The CIO focus on business intelligence (BI) and analytics looks set to continue through 2017, according to Gartner. Gartner said that the benefits of fact-based …
Gamers attacked 11.7 million times in 2013
Just days after the launch of the PlayStation 4 and the Xbox One, Kaspersky Lab experts have discovered that PC gamers across Europe were hit by a massive number of attacks in …
How competitive is your cybersecurity team?
SecureWorld Insight, a partnership with Ponemon Institute and SecureWorld Expo, identified compensation for eight categories of information security staff – from CISOs …
IT pros are playing cat and mouse with cybercriminals
IT professionals admit to feeling lost when it comes to trying to protect the company against cyber attacks and cybercriminals. This could be a big problem for all of us, as …
DDoS attacks escalate, businesses still unprepared
Many businesses are failing to take adequate measures to protect themselves against the threat of a DDoS attack. A Corero Network Security survey of 100 companies revealed …
Secure remote access trends
HOB announced the results of a new survey which quantifies the trends and pain points CTO’s and CIO’s in the United States experience when utilizing remote access …
Top 100 Android apps hacked in 2013
One hundred percent of the Top 100 paid Android apps and 56 percent of the Top 100 paid Apple iOS apps have been hacked, according to Arxan. As the growth in mobile innovation …
What do people want to hide on their smartphone?
More than half of Americans (52%) would be embarrassed about friends or family seeing certain files or documents on their smartphone, according to Clean Master. The number one …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act