Please turn on your JavaScript for this page to function normally.
Deconstructing hacktivist operations and tools

Imperva released its September Hacker Intelligence report, which details the latest methods deployed by hackers to execute DDoS attacks by analyzing the technical tools and …

Darwin’s theory applies to malware

G Data’s new malware report shows a new and unexpected development in malware: the extreme growth of new malicious programs seems to be slowing down. Granted, the …

Phishers continue to target legitimate websites

Attackers confidently exploit legitimate websites with the same methods and that they succeed because victims are not implementing recommended best practices, countermeasures …

Real-world software security initiatives study

Cigital announced the fourth major release of the Building Security In Maturity Model (BSIMM) study. This release describes real-world data from fifty-one firms with active …

One third of European organizations refuse to implement BYOD

Imation released research which shows that German workers are most likely to follow rules around secure remote working, with 50% of German respondents saying that they always …

Data migrations: Potential security hole

While 95% of organisations move data at least once per year, 65% of those surveyed admitted that they were not confident sensitive data was protected during a migrationm, …

Cloud services market to surpass $109 billion in 2012

The public cloud services market is forecast to grow 19.6 percent in 2012 to total $109 billion worldwide, according to Gartner. Business process services (also known as …

Majority of companies suffered a web application security breach

Web application security incidents have become increasingly common and expensive, with the majority of companies experiencing at least one breach in the last 18 months and …

Android malware threats analysis

Bitdefender released its August 2012 Android malware threats report. While in August the percentage of adware-bundled apps dropped to 55.15 per cent, from July’s 77.34 …

Worldwide security infrastructure market will grow 8.4%

While the global economic slowdown has been putting pressure on IT budgets, security is expected to remain a priority through 2016, according to Gartner. Worldwide spending on …

The QR code: A new frontier in mobile attackability

A single poisoned link is all it takes to expose an entire organization to a full-scale attack. Hackers write sophisticated browser-based attacks that operate quite …

Every third computer in North America attacked while online

An in-depth analysis of the nature of cybercrime in North America and Western Europe in the first six months of 2012 by Kaspersky Lab found that the computers of 33.4% of …

Don't miss

Cybersecurity news