Please turn on your JavaScript for this page to function normally.
Moving federal mission-critical applications to the cloud

As federal agencies are making cloud progress, the early-adopters that are moving their mission-critical applications to the cloud are realizing cost savings and improved …

Deconstructing hacktivist operations and tools

Imperva released its September Hacker Intelligence report, which details the latest methods deployed by hackers to execute DDoS attacks by analyzing the technical tools and …

Darwin’s theory applies to malware

G Data’s new malware report shows a new and unexpected development in malware: the extreme growth of new malicious programs seems to be slowing down. Granted, the …

Phishers continue to target legitimate websites

Attackers confidently exploit legitimate websites with the same methods and that they succeed because victims are not implementing recommended best practices, countermeasures …

Real-world software security initiatives study

Cigital announced the fourth major release of the Building Security In Maturity Model (BSIMM) study. This release describes real-world data from fifty-one firms with active …

One third of European organizations refuse to implement BYOD

Imation released research which shows that German workers are most likely to follow rules around secure remote working, with 50% of German respondents saying that they always …

Data migrations: Potential security hole

While 95% of organisations move data at least once per year, 65% of those surveyed admitted that they were not confident sensitive data was protected during a migrationm, …

Cloud services market to surpass $109 billion in 2012

The public cloud services market is forecast to grow 19.6 percent in 2012 to total $109 billion worldwide, according to Gartner. Business process services (also known as …

Majority of companies suffered a web application security breach

Web application security incidents have become increasingly common and expensive, with the majority of companies experiencing at least one breach in the last 18 months and …

Android malware threats analysis

Bitdefender released its August 2012 Android malware threats report. While in August the percentage of adware-bundled apps dropped to 55.15 per cent, from July’s 77.34 …

Worldwide security infrastructure market will grow 8.4%

While the global economic slowdown has been putting pressure on IT budgets, security is expected to remain a priority through 2016, according to Gartner. Worldwide spending on …

The QR code: A new frontier in mobile attackability

A single poisoned link is all it takes to expose an entire organization to a full-scale attack. Hackers write sophisticated browser-based attacks that operate quite …

Don't miss

Cybersecurity news