Please turn on your JavaScript for this page to function normally.
UK network and ISP study reveals slow speeds and geographic variance

A study by Pando Networks revealed striking disparities between the theoretical and real-world download speeds for British broadband users. By tracking the end-user speeds for …

Protecting mobile phones? Most don’t bother

Although almost a quarter of consumers (22%) have lost a mobile phone in the past, and a further 12% have had a phone stolen, 67% don’t have passwords set up on their …

Annual cost of cybercrime highlights need for governance

ISACA commends the Ponemon Institute’s latest “Cost of cybercrime” report for the detail it provides on the indirect costs of IT security attacks, as well as …

Phishers becoming sophisticated marketers of fraud

Phishers are becoming more sophisticated criminal marketers, according to a report by IID which documents a quarter that was a watershed for data breaches, from large-scale …

Phishing attacks on Facebook intensify

There was a significant increase in the amount of phishing attacks on Facebook, as well as other social networking sites such as Habbo in June, according to the latest spam …

Most workaholics don’t secure their mobile devices

Bags packed, flights booked and foreign currency in their pockets. The workforce might be jetting off but they’re definitely not leaving the daily grind behind. Instead, …

Companies underestimate costs of security breaches

Aveksa announced the findings of a recent survey conducted to examine many different facets of IT security, including:: Concerns about moving sensitive applications and data …

Global analysis of 10 million web attacks

Web applications, on average, experience twenty seven attacks per hour, or roughly one attack every two minutes, according to Imperva. They observed and categorized attacks …

In the “speed vs. security” battle, speed still wins

The increasing number and severity of recent data breaches and cyber attacks have made one thing clear among major corporations and government entities: developing a strong …

Travelers left 11,000 mobile devices at U.S. airports

Travelers left behind more than 11,000 laptops, tablet PCs, smartphones and USB sticks in airports in the United States during the past year. Credant was able to gather survey …

An examination of malware ecosystems

Malware delivery networks are typically hosted across multiple sites and are responsible for launching dynamic attacks on unsuspecting users. A new Blue Coat report examines …

Mass spam volumes plummeting as cybercriminals turn to pinpointed attacks

In the complex and ever-changing landscape of online crime, cybercriminals have made a fundamental shift in strategy, abandoning traditional mass spam attacks in favor of …

Don't miss

Cybersecurity news