Please turn on your JavaScript for this page to function normally.
Most prevalent threat detections of the holiday season

In November, GFI threat researchers encountered email threats disguised as notices from American Express, DHL and UPS as the holiday season kicked into full gear, as well as a …

Proprietary platforms to cause complexity in 2013

Citrix predicts that the rise of consumerisation and the Bring-Your-Own (BYO) phenomenon will force IT departments to focus on the challenge of apps and data governance. 2012 …

Motives behind IT budget spend and 2013 cloud trends

A global survey of 550 CIOs, IT Directors, and senior IT managers has confirmed motives behind their IT budget spend in 2012, while revealing the rate of cloud adoption in …

Half of CIOs don’t test cloud security

Cybersecurity tops CIO’s concerns, with 84% of CIOs stating that they are either concerned or very concerned about the risks associated with IT security breaches. Yet …

Analysis of U.S. breach data finds reasons for concern

According to the Health Information Trust Alliance’s (HITRUST) analysis of U.S. healthcare data breaches from 2009 to the present, the healthcare industry has made …

Antivirus solutions inadequate in detecting new viruses

Imperva collected and analyzed more than 80 previously non-cataloged viruses against more than 40 antivirus solutions. They found that less than 5% of anti-virus solutions in …

80% of attacks are redirects from legitimate sites

Sophos released its Security Threat Report 2013, a detailed and interactive assessment of what’s happened in IT security for 2012 and what’s expected for 2013. …

Risk study identifies top pain points in 2013

The state of endpoint risk is not improving according to the fourth annual report researched by the Ponemon Institute. IT professionals reported the flood of mobile devices …

Three out of every four malware infections are caused by Trojans

PandaLabs analyzed the IT security events and incidents from July through September 2012. The third quarter of the year has seen an increase in the number of hacking attacks …

Mobile and cloud developments will dominate 2013

For the past several years, the IT industry’s transition to the 3rd Platform, built on mobile computing, cloud services, social networking, and big data analytics …

Most Americans uninformed about DDoS attacks

Whether motivated by an extreme form of free expression or criminal intent, distributed denial-of-service attacks (DDoS attacks) are increasingly commonplace worldwide. Yet …

Understanding basic honeypot concepts

The EU cyber security Agency ENISA is launching an in-depth study on 30 different digital traps or honeypots that can be used by CERTs to proactively detect cyber attacks. The …

Don't miss

Cybersecurity news