39% of IT staff can get unauthorized access to sensitive information
IT professionals are allowed to roam around corporate networks unchecked, according to a survey of more than 450 IT professionals by Lieberman Software. It found that 39% of …
Jump in mobile app and banking scams
In August, GFI threat researchers identified a number of high-profile fake mobile application scams, along with a spike in email scams targeting UK banking and government …
Who is the most dangerous cyber celebrity?
Emma Watson has replaced Heidi Klum as McAfee’s 2012 most dangerous celebrity to search for online. For the sixth year in a row, McAfee researched popular …
Data breaches expose 94 million records in the government sector
An analysis of government breach data shows that the government sector reported 268 incidents of data breaches from January 1, 2009 to May 31, 2012, which exposed more than 94 …
87% have something to hide on their smartphones
When it comes to the almost weekly reports of celebrity phone hackings and leaks, more than half of consumers believe these are merely stunts to garner publicity. In the end, …
Zero-day-loving Google hackers furiously active in last three years
The hackers behind the Aurora attacks that were discovered targeting Google, Adobe and other big U.S. companies in 2009 have seemingly been working hard ever since. Symantec …
Dynamic hacking risks target web application security
Web applications remain the third most common attack vector overall, with hacking still on the increase, from organized criminal groups, amateurs and political activists. …
Savviest North American cities for online security
AVG announced the results of a survey of 15 key U.S. and Canadian cities to determine which is the savviest when it comes to defense against online threats. The winner: …
Cybercrime costs consumers $110 billion
With findings based on self-reported experiences of more than 13,000 adults across 24 countries, the 2012 edition of the Norton Cybercrime Report calculates the direct costs …
Service desks not equipped to deal with BYOD
A majority of company IT support teams are either unable or unwilling to support their employees who want to bring their own device (BYOD) to work, according to a survey by …
Cybercriminals use throw-away domains to infiltrate enterprise networks
The first six months of 2012 saw continued increases of malicious infection activity and an intensified danger of email-based attacks as cybercriminals increasingly employed …
UK data breaches up 1000% in five years
Imation today released figures obtained through a request under the Freedom of Information Act which show that data breach numbers in the UK have increased by more than 1000% …