Please turn on your JavaScript for this page to function normally.
Mass spam volumes plummeting as cybercriminals turn to pinpointed attacks

In the complex and ever-changing landscape of online crime, cybercriminals have made a fundamental shift in strategy, abandoning traditional mass spam attacks in favor of …

iOS and Android more secure than PCs?

While the most popular mobile platforms in use today were designed with security in mind, these provisions are not always sufficient to protect sensitive enterprise assets …

Internet myths putting Americans at risk

Americans’ knowledge of Internet security is scattered with misconceptions and fallacies that expose PC users to a slew of online threats, according to G Data Security. …

European study unveils IT security strategies

Fortinet unveiled the findings of a survey into the IT security strategies which queried enterprise IT decision makers in France, Germany, Italy, Spain, Benelux and the UK …

Demonstrating compliance effectiveness a top priority

71 percent of banks, 72 percent of insurance companies and 84 percent of other financial services organizations believe that demonstrating compliance effectiveness is a top …

Bad software patches cause critical IT failure

Half of businesses have suffered at least one business critical IT failure as a result of installing a bad software patch, according to GFI Software. The research also …

IT data management now a major enterprise initiative

Evolving requirements for leveraging IT information have led to the emergence of IT data management (ITDM) as a major enterprise initiative, according to LogLogic. They also …

Huge decline of Autorun-abusing malware

Infections with malware that abuses the Windows Autorun feature by automatically enabling AutoPlay have been declining since February, says Microsoft, and credits the security …

Risk management under pressure

Has the financial services industry reached a comfort zone, placing it in jeopardy of another crisis? Are today’s risk management practices and reporting in tune with …

Malware activity hitting peaks of 10 million pieces per day

Virus and malware activity increased during the month of May, sporadically hitting peaks of more than 10 million pieces per day, according to AppRiver. Major news events, once …

Web host victims repeatedly exploited by cybercriminals

More than one-third of respondents to an Anti-Phishing Working Group (APWG) survey were repeat victims of phishing attacks that resulted in a successful establishment of …

Study examining the usage of hardware-based encrypting drives

The Trusted Computing Group (TCG) and Ponemon Institute released a full report on the perceptions about self-encrypting drives. The study interviewed 517 IT practitioners in …

Don't miss

Cybersecurity news