SharePoint users develop insecure habits
Microsoft SharePoint users are aware of the risks that exposing sensitive data can cause to their organization, yet unbelievably they are using the collaboration tool as an …
74% believe mobile devices increase security incidents
The number of personal mobile devices connecting to corporate networks has more than doubled in the past two years, according to Check Point. 74% of UK businesses (compared …
Global view into application usage
New research published by Palo Alto Networks indicates explosive growth in global social networking and browser-based file sharing on corporate networks, with a 300 percent …
Threat incidents and security wins in 2011
Having spent much of the year battling data breaches that led to huge information and financial loss, the security industry was likely relieved to see 2011 come to a close. In …
Volume and sophistication of attacks to increase
Based on activity levels observed in the second half of 2011, the growing pace, volume and sophistication of attacks suggest consumers, small businesses and corporations will …
Retailers increasingly considering biometric authentication
More than half of retailers still use passwords for point-of-sale (POS) system login, despite concerns over the sharing and misuse of those passwords, according to …
Key security developments for 2012
Kroll Ontrack, the leading provider of data recovery, electronic discovery, and information management products and services, today announced the most important technology …
Worldwide IT spending to grow in 2012
Worldwide IT spending is forecast to total $3.8 trillion in 2012, a 3.7 percent increase from 2011, according to the latest outlook by Gartner. In 2011, worldwide IT spending …
Online scam susceptibility of American consumers
PC Tools, in collaboration with the Ponemon Institute, announced the findings of its online scam susceptibility study of 1,858 American consumers. The results of the survey …
Analysis of Facebook attacks
Commtouch published a comprehensive analysis of scores of malicious Facebook activities during the past year. Affiliate marketing sites are the final destination in …
Emerging threats to become major players in 2012
Emerging threats from 2011 are on track to become the major players for cyberactivity in 2012, including mobile banking, “legal” spam and virtual currency. McAfee …
Data-stealing malware growth spikes
The propagation of some forms of crimeware surged in the half-year period ending in June, 2011 with data-stealing malware reaching and maintaining a new plateau of contagion, …
Featured news
Resources
Don't miss
- Commix: Open-source OS command injection exploitation tool
- Review: The Chief AI Officer’s Handbook
- How QR code attacks work and how to protect yourself
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects