Deconstructing hacktivist operations and tools
Imperva released its September Hacker Intelligence report, which details the latest methods deployed by hackers to execute DDoS attacks by analyzing the technical tools and …
Darwin’s theory applies to malware
G Data’s new malware report shows a new and unexpected development in malware: the extreme growth of new malicious programs seems to be slowing down. Granted, the …
Phishers continue to target legitimate websites
Attackers confidently exploit legitimate websites with the same methods and that they succeed because victims are not implementing recommended best practices, countermeasures …
Real-world software security initiatives study
Cigital announced the fourth major release of the Building Security In Maturity Model (BSIMM) study. This release describes real-world data from fifty-one firms with active …
One third of European organizations refuse to implement BYOD
Imation released research which shows that German workers are most likely to follow rules around secure remote working, with 50% of German respondents saying that they always …
Data migrations: Potential security hole
While 95% of organisations move data at least once per year, 65% of those surveyed admitted that they were not confident sensitive data was protected during a migrationm, …
Cloud services market to surpass $109 billion in 2012
The public cloud services market is forecast to grow 19.6 percent in 2012 to total $109 billion worldwide, according to Gartner. Business process services (also known as …
Majority of companies suffered a web application security breach
Web application security incidents have become increasingly common and expensive, with the majority of companies experiencing at least one breach in the last 18 months and …
Android malware threats analysis
Bitdefender released its August 2012 Android malware threats report. While in August the percentage of adware-bundled apps dropped to 55.15 per cent, from July’s 77.34 …
Worldwide security infrastructure market will grow 8.4%
While the global economic slowdown has been putting pressure on IT budgets, security is expected to remain a priority through 2016, according to Gartner. Worldwide spending on …
The QR code: A new frontier in mobile attackability
A single poisoned link is all it takes to expose an entire organization to a full-scale attack. Hackers write sophisticated browser-based attacks that operate quite …
Every third computer in North America attacked while online
An in-depth analysis of the nature of cybercrime in North America and Western Europe in the first six months of 2012 by Kaspersky Lab found that the computers of 33.4% of …