Please turn on your JavaScript for this page to function normally.
Spam filtering tools fail short with phishing attacks

Enterprise users receive unfiltered phishing messages nearly every day of the week, and most of them are not properly trained to recognize or safely react to them, according …

Threats and protection issues of cloud data

Eighty-two percent of organizations already transfer, or plan to transfer, sensitive or confidential data into the cloud environment according to a global study of 4,000 …

The underground economy of social networks

In a new study, Barracuda Labs analyzed a random sampling of more than 70,000 fake Twitter accounts that are being used to sell fake Twitter followers. They also analyzed some …

Risky password habit exposed

Over 70% of online users memorize the passwords they use to access secure websites rather than record them on paper or digitally according to a recent survey conducted by …

Insider threat in financial services sector

When it comes to preventing insider fraud, financial organizations would do well to more closely monitor experienced, mid-level employees with years on the job, according to a …

Fake products pose real dangers

It’s no surprise that many high-end luxury items, such as handbags and watches, have had its share of knock-offs over the years, mainly because they’re often …

Wargame examines the future of US infrastructure

Booz Allen Hamilton concluded the first-ever wargame simulation examining creative infrastructure initiatives and solutions that factor in US transportation needs by the year …

Most users think content is more important than the device

A global F-Secure survey of broadband subscribers has identified security, privacy and issues relating to the storing and sharing of digital content as key concerns. The …

Cybercriminals use social engineering to extend lifecycle of malware

Android smartphone users remain a lucrative target as the platform currently has 59 percent global market share and is on track to stay the most shipped mobile operating …

Hidden security risks of top mobile apps

Appthority cast a spotlight on the hidden behaviors of the top free mobile apps. The report reveals the security issues raised by the BYOD movement, app market fragmentation …

What will the workplace of the future look like?

IT consumerization is dependent on an open-minded approach by organizations, and most likely to succeed with specific, pre-defined parameters, according to Dell and Intel. …

Location tracking becomes more attractive

In a GFI Software survey of more than 1,000 U.S. respondents, 12% say they would use location tracking to monitor their spouse’s whereabouts, while 31% of respondents …

Don't miss

Cybersecurity news