Please turn on your JavaScript for this page to function normally.
Cybercrime statistics in Ireland

The Irish Reporting and Information Security Service (IRISSCERT) released statistics on cybercrime incidents it has dealt with so far in 2011. The statistics are based on all …

The most vulnerable smartphones

Bit9 highlighted the most vulnerable popular smartphones in use today. The devices on the list pose the most serious security and privacy risk to consumers and corporations. …

IT security budgets set by U.S. federal agencies

A new IDC Government Insights report examines IT security budgets set by each U.S. federal agency and reveals how much each organization actually spends on security-focused …

Why SMBs are attractive to hackers

A Symantec global survey of nearly 2,000 SMBs showed that 50% did not consider themselves an attack target. However, looking at today’s threat landscape, this is clearly …

Cybercriminals to turn mobile phones into ATMs

With all of the crazy 2011 security breaches, exploits and notorious hacks, what can we expect for 2012? Researchers of the Websense Security Labs provide their top …

Changing nature of DDoS attacks

The volume of packets-per-second (PPS) has almost quadrupled compared to Q3 2010, illustrating a significant increase in the size and diversity of DDoS attacks over the past …

Change management leads to security breaches

75% of organizations believe their current change management processes could put them at risk of a security breach, according to Tufin. Having sampled 100 network security …

Why do companies backup infrequently?

Businesses are on average backing up to tape once a month, with one rather alarming statistic from the same survey showing 10 percent were only backing up to tape once per …

Top requirements for operating data in the cloud

The Cloud Security Alliance (CSA) Cloud Data Governance (CDG) working group today introduced the results of its Cloud Consumer Advocacy Questionnaire and Information Survey. …

Effectiveness of web application firewalls

The best defense against web application vulnerabilities and threats is to professionally train Web Application Firewalls (WAFs) and to incorporate Dynamic Application …

Email archive productivity headache

U.S. businesses are failing to maximize the efficiency with which they extract useful business intelligence from archived email, according to GFI Software. While a majority of …

Expect an escalation in targeted attacks

Organizations and Internet users can expect an escalation in targeted attacks, growing social media threats and an increase in mobile malware, according to the M86 Security. …

Don't miss

Cybersecurity news