DDoS attacks continue to fall in size and frequency
The newest up-and-coming countries of origin for DDoS attacks will be Vietnam, India and Indonesia in 2015, according to Black Lotus. While these countries don’t have …
One billion attacks were blocked during the third quarter
Over a billion malicious attacks were detected and blocked during the third quarter, according to Kaspersky Lab. One third of Web attacks were carried out using malicious Web …
Whitepaper: CISOs secret weapon for reducing enterprise risk
Security events happen to the best of organizations. Business and data move at lightning-speed, and CISOs have to not only keep pace with current risks, but anticipate future …
Open Whisper Systems helps WhatsApp achieve end-to-end encryption
The immensely popular Whatsapp instant messenger has the potential to become an even more attractive option for users, as the company has partnered with Open Whisper Systems …
Cisco open sources Big Data security analytics framework
“Technically advanced attackers often leave behind clue-based evidence of their activities, but uncovering them usually involves filtering through mountains of logs and …
Critical factors in preventing data breaches
McAfee issued a new report that assesses organizations’ abilities to detect and deflect targeted attacks, reveals the top eight most critical indicators of attack, and …
Michaels and Staples breaches carried out by same attackers?
The attackers that stole payment card information from consumers of Texas-based arts and crafts store chain Michaels and international office supply chain store Staples are …
One-in-four have been victims of identity theft
Identity theft has ranked as the top concern amongst consumers questioned about their digital lifestyles, according to Centrify. The survey of 1,000 UK consumers, reveals that …
Trojanized Android firmware found on inexpensive handhelds
It’s unfortunate, but true: we live in a world where even if we buy a brand new mobile phone, it’s no guarantee that it’s malware-free. Researchers from …
Top 5 fraud risk areas in the workplace
Limited knowledge and awareness about what constitutes confidential information is putting UK businesses at risk of falling victim to fraud if these materials are not securely …
TRUSTe deceived consumers through its privacy seal program
TRUSTe has agreed to settle Federal Trade Commission charges that it deceived consumers about its recertification program for company’s privacy practices, as well as …
ReadyNAS OS offers 5 levels of data protection
NETGEAR is releasing a new version of its ReadyNAS operating system for its ReadyNAS family of desktop and rack-mount NAS devices. ReadyNAS OS 6.2 offers improvements in data …
Featured news
Sponsored
Don't miss
- Scammers dupe chemical company into wiring $60 million
- Australian gold mining company hit with ransomware
- Browser backdoors: Securing the new frontline of shadow IT
- Key metrics for monitoring and improving ZTNA implementations
- Chrome, Edge users beset by malicious extensions that can’t be easily removed