Please turn on your JavaScript for this page to function normally.
Businesses unable to comply with EC 24 hour breach notification

UK businesses do not believe they have the capability to comply with new European Commission Data Protection Directive rules, specifically the ability to generate accurate …

Most parents secretly access teens’ Facebook accounts

For generations, parents have been suspicious of teens’ social activities – and have employed any number of tactics to uncover the truth. Today’s parents are …

Mobile phones expose businesses to massive risks

Organizations are failing to respond to the culture of employees using their own mobile devices for work and are opening up their systems to security risks. These are the …

Big data disruptions can be tamed

Enterprise architecture (EA) practitioners have a major role in ensuring their organizations maximize the business opportunities posed by big data, according to Gartner. Big …

Is online banking like playing Russian Roulette?

Four out of ten consumers suspect they are playing with fire conducting financial transactions online, according to Entersekt. The study of 1,000 people, found that while the …

Poor internal security processes spell disaster

Poor internal security management processes present more risk than malicious threats. More than 50 percent of an AlgoSec survey respondents incurred a system outage due to an …

Mobile devices expose company data to vulnerabilities

Mobilisafe announced results of its SMB focused study. As part of a private beta program, participants evaluated a product that assesses the security risk of mobile devices …

Smart meters vulnerable to false data injection

Power grids connect electricity producers to consumers through interconnected transmission and distribution networks. In these networks, system monitoring is necessary to …

It’s official, corporate passwords are cheap

Nearly 50 per cent of employees would readily sell their corporate passwords for less than £5, according to Ping Identity. 30% would do the deed for even less, happily …

Sustained drop in spam levels

Industry and government efforts have dealt a significant blow to spam, according to a Commtouch report that is compiled based on an analysis of more than 10 billion …

SQL injection main database security concern among SMBs

GreenSQL surveyed more than six thousand GreenSQL SMB users – IT administrators, DBAs, data security professionals and consultants – about their most critical …

Deconstructing local and remote file inclusion attack vectors

Imperva released its latest Hacker Intelligence Initiative report exploring how Local and Remote File Inclusion (RFI/LFI) attacks enable hackers to execute malicious code and …

Don't miss

Cybersecurity news