UK network and ISP study reveals slow speeds and geographic variance
A study by Pando Networks revealed striking disparities between the theoretical and real-world download speeds for British broadband users. By tracking the end-user speeds for …
Protecting mobile phones? Most don’t bother
Although almost a quarter of consumers (22%) have lost a mobile phone in the past, and a further 12% have had a phone stolen, 67% don’t have passwords set up on their …
Annual cost of cybercrime highlights need for governance
ISACA commends the Ponemon Institute’s latest “Cost of cybercrime” report for the detail it provides on the indirect costs of IT security attacks, as well as …
Phishers becoming sophisticated marketers of fraud
Phishers are becoming more sophisticated criminal marketers, according to a report by IID which documents a quarter that was a watershed for data breaches, from large-scale …
Phishing attacks on Facebook intensify
There was a significant increase in the amount of phishing attacks on Facebook, as well as other social networking sites such as Habbo in June, according to the latest spam …
Most workaholics don’t secure their mobile devices
Bags packed, flights booked and foreign currency in their pockets. The workforce might be jetting off but they’re definitely not leaving the daily grind behind. Instead, …
Companies underestimate costs of security breaches
Aveksa announced the findings of a recent survey conducted to examine many different facets of IT security, including:: Concerns about moving sensitive applications and data …
Global analysis of 10 million web attacks
Web applications, on average, experience twenty seven attacks per hour, or roughly one attack every two minutes, according to Imperva. They observed and categorized attacks …
In the “speed vs. security” battle, speed still wins
The increasing number and severity of recent data breaches and cyber attacks have made one thing clear among major corporations and government entities: developing a strong …
Travelers left 11,000 mobile devices at U.S. airports
Travelers left behind more than 11,000 laptops, tablet PCs, smartphones and USB sticks in airports in the United States during the past year. Credant was able to gather survey …
An examination of malware ecosystems
Malware delivery networks are typically hosted across multiple sites and are responsible for launching dynamic attacks on unsuspecting users. A new Blue Coat report examines …
Mass spam volumes plummeting as cybercriminals turn to pinpointed attacks
In the complex and ever-changing landscape of online crime, cybercriminals have made a fundamental shift in strategy, abandoning traditional mass spam attacks in favor of …