Please turn on your JavaScript for this page to function normally.
SharePoint users develop insecure habits

Microsoft SharePoint users are aware of the risks that exposing sensitive data can cause to their organization, yet unbelievably they are using the collaboration tool as an …

74% believe mobile devices increase security incidents

The number of personal mobile devices connecting to corporate networks has more than doubled in the past two years, according to Check Point. 74% of UK businesses (compared …

Global view into application usage

New research published by Palo Alto Networks indicates explosive growth in global social networking and browser-based file sharing on corporate networks, with a 300 percent …

Threat incidents and security wins in 2011

Having spent much of the year battling data breaches that led to huge information and financial loss, the security industry was likely relieved to see 2011 come to a close. In …

Volume and sophistication of attacks to increase

Based on activity levels observed in the second half of 2011, the growing pace, volume and sophistication of attacks suggest consumers, small businesses and corporations will …

Retailers increasingly considering biometric authentication

More than half of retailers still use passwords for point-of-sale (POS) system login, despite concerns over the sharing and misuse of those passwords, according to …

Key security developments for 2012

Kroll Ontrack, the leading provider of data recovery, electronic discovery, and information management products and services, today announced the most important technology …

Worldwide IT spending to grow in 2012

Worldwide IT spending is forecast to total $3.8 trillion in 2012, a 3.7 percent increase from 2011, according to the latest outlook by Gartner. In 2011, worldwide IT spending …

Online scam susceptibility of American consumers

PC Tools, in collaboration with the Ponemon Institute, announced the findings of its online scam susceptibility study of 1,858 American consumers. The results of the survey …

Analysis of Facebook attacks

Commtouch published a comprehensive analysis of scores of malicious Facebook activities during the past year. Affiliate marketing sites are the final destination in …

Emerging threats to become major players in 2012

Emerging threats from 2011 are on track to become the major players for cyberactivity in 2012, including mobile banking, “legal” spam and virtual currency. McAfee …

Data-stealing malware growth spikes

The propagation of some forms of crimeware surged in the half-year period ending in June, 2011 with data-stealing malware reaching and maintaining a new plateau of contagion, …

Don't miss

Cybersecurity news