Spam filtering tools fail short with phishing attacks
Enterprise users receive unfiltered phishing messages nearly every day of the week, and most of them are not properly trained to recognize or safely react to them, according …
Threats and protection issues of cloud data
Eighty-two percent of organizations already transfer, or plan to transfer, sensitive or confidential data into the cloud environment according to a global study of 4,000 …
The underground economy of social networks
In a new study, Barracuda Labs analyzed a random sampling of more than 70,000 fake Twitter accounts that are being used to sell fake Twitter followers. They also analyzed some …
Risky password habit exposed
Over 70% of online users memorize the passwords they use to access secure websites rather than record them on paper or digitally according to a recent survey conducted by …
Insider threat in financial services sector
When it comes to preventing insider fraud, financial organizations would do well to more closely monitor experienced, mid-level employees with years on the job, according to a …
Fake products pose real dangers
It’s no surprise that many high-end luxury items, such as handbags and watches, have had its share of knock-offs over the years, mainly because they’re often …
Wargame examines the future of US infrastructure
Booz Allen Hamilton concluded the first-ever wargame simulation examining creative infrastructure initiatives and solutions that factor in US transportation needs by the year …
Most users think content is more important than the device
A global F-Secure survey of broadband subscribers has identified security, privacy and issues relating to the storing and sharing of digital content as key concerns. The …
Cybercriminals use social engineering to extend lifecycle of malware
Android smartphone users remain a lucrative target as the platform currently has 59 percent global market share and is on track to stay the most shipped mobile operating …
Hidden security risks of top mobile apps
Appthority cast a spotlight on the hidden behaviors of the top free mobile apps. The report reveals the security issues raised by the BYOD movement, app market fragmentation …
What will the workplace of the future look like?
IT consumerization is dependent on an open-minded approach by organizations, and most likely to succeed with specific, pre-defined parameters, according to Dell and Intel. …
Location tracking becomes more attractive
In a GFI Software survey of more than 1,000 U.S. respondents, 12% say they would use location tracking to monitor their spouse’s whereabouts, while 31% of respondents …
Featured news
Sponsored
Don't miss
- The changes in the cyber threat landscape in the last 12 months
- The CISO’s approach to AI: Balancing transformation with trust
- 10 fintech companies to watch in 2024
- Despite economic uncertainty, organizations are prioritizing SaaS security investments
- Confidential AI: Enabling secure processing of sensitive data