Please turn on your JavaScript for this page to function normally.
The globalization of business is increasing exposure to fraud

The number of companies falling victim to fraud has increased in the past year, according to the 2013 Kroll Global Fraud Report. Overall, 70 percent of companies were affected …

Data visualization of global DDoS attacks

Arbor Networks have collaborated with Google Ideas to create a data visualization that maps global DDoS attacks. Google Ideas – a “think/do’ tank – …

A new classification for potentially unwanted mobile apps

What are PUAs (Potentially Unwanted Applications), and how should they be classified in the mobile (specifically Android) environment? PUAs are not technically malware, and …

Higher education networks 300% more likely to contain malware

OpenDNS researchers found that higher education networks are 300 percent more likely to contain malware than their enterprise and government counterparts. The study also …

Building an information security awareness program from scratch

Most security awareness programs suck. They involve canned video presentations or someone from HR explaining computer use policies. Others are extremely expensive and beyond …

Internet of Things starter kit from IBM and Libelium

IBM and Libelium released an Internet of Things Starter Kit to enable dozens of sensor applications ranging from monitoring parking spaces or air pollution to providing …

Webinar: The threat of unfettered searching

While many have come to appreciate the power of modern search engines, such as Google or Bing, there is a threat presented by unfettered searching – one that can …

Mobile IDS/IPS solution for iOS devices

Skycure introduced its mobile IDS/IPS solution that protects iPhones and iPads by monitoring network traffic behavior and remediating suspicious activity. Existing solutions …

Facebook data mining tool uncovers your life

You know you shouldn’t post potentially damaging data on Facebook, but more often that not, your friends don’t think twice about it, and this can impact you even …

Can you trust the apps you use?

With the advent of smartphones, the word “app” has almost become a synonym for pleasure. Whatever you need, whatever you want is right there at your fingertips, …

Video: Operationalizing security intelligence in the enterprise

Many organizations say they acquire and use security intelligence for the benefit of their organizations – but few actually do this right. While security intelligence is …

Week in review: Vessel tracking system cracked, iCloud protocols analyzed, the relevancy of AV tests

Here’s an overview of some of last week’s most interesting news, videos, inteviews and articles: Digital ship pirates: Researchers crack vessel tracking system In …

Don't miss

Cybersecurity news