Please turn on your JavaScript for this page to function normally.
Key security developments for 2012

Kroll Ontrack, the leading provider of data recovery, electronic discovery, and information management products and services, today announced the most important technology …

Worldwide IT spending to grow in 2012

Worldwide IT spending is forecast to total $3.8 trillion in 2012, a 3.7 percent increase from 2011, according to the latest outlook by Gartner. In 2011, worldwide IT spending …

Online scam susceptibility of American consumers

PC Tools, in collaboration with the Ponemon Institute, announced the findings of its online scam susceptibility study of 1,858 American consumers. The results of the survey …

Analysis of Facebook attacks

Commtouch published a comprehensive analysis of scores of malicious Facebook activities during the past year. Affiliate marketing sites are the final destination in …

Emerging threats to become major players in 2012

Emerging threats from 2011 are on track to become the major players for cyberactivity in 2012, including mobile banking, “legal” spam and virtual currency. McAfee …

Data-stealing malware growth spikes

The propagation of some forms of crimeware surged in the half-year period ending in June, 2011 with data-stealing malware reaching and maintaining a new plateau of contagion, …

Challenges facing critical infrastructure operators

While critical infrastructure operators hold great responsibility for managing security, compliance and operations, many struggle to balance the resources required for each of …

Security behavior and buying trends for 2012

PCI data security standards may be a hot topic, but a recent survey by Gartner found that 18 percent of respondents admitted to not being PCI-compliant, even though the survey …

Mobile pickpocketing and botnets will rise

Mobile threats are on the rise — Lookout estimates that mobile threats successfully stole more than one million dollars from Android users in 2011. In 2012, Lookout predicts …

Virtualization can transform data protection

According to a Vanson Bourne survey of 500 CIOs virtualization has the potential to transform data protection. In order to achieve this, greater strides need to be made in …

Confidential data exposure in public spaces

While protecting data on computers is top of mind for everyone, most organizations are focused on conventional security technologies such as anti-virus software, personal …

Top software failures of 2011

SQS Software Quality Systems compiled a list of the worst software failures of 2011 that have damaged reputations, impacted negatively on financials and caused stress to …

Don't miss

Cybersecurity news