Epidemic of unknown malware on enterprise networks
Check Point has issued a report uncovering the major security events that occurred and impacted organizations across the world in 2013. The report is based on analysis of …
Key trends in cloud usage, risks and malware
Skyhigh Networks released the third edition of its quarterly Cloud Adoption and Risk Report. “With this report, we uncovered trends beyond the presence of shadow IT in …
Are rogue employees the biggest threat to information security?
Rogue employees continue to be the biggest threat to information security, according to 37% of IT professionals polled by BSI at Infosecurity Europe 2014. The poll …
US tech giants urge FCC to protect net neutrality
As the moment when the Federal Communication Commission (FCC) will decide the future of net neutrality draws near, over 100 Internet companies have sent an open letter to the …
Small businesses targeted with email-borne exploits
Even though the data gathered by Microsoft points to the fact that cybercriminals now prefer deceptive tactics to exploits, it does not mean that the latter approach has been …
Malware peddlers prefer deceptive tactics to exploits
Cyber crooks are losing interested in exploits as an attack vector, and are concentrating on deceptive downloads and ransomware as a means of earning/stealing money. The trend …
The prime target for malicious emails
In the first quarter of 2014 spammers started imitating messages from mobile applications. They especially like the popular mobile messengers – WhatsApp, Viber and …
Orange hacked again, 1.3M users affected
French telecom provider Orange has suffered a second data breach in less that four months, and this time the intruders made off with personal information of some 1.3 million …
Growing dynamic in politically-motivated hacktivism
While financial cybercrime becomes ever more entrenched through a consolidating demand and supply chain, the hacktivist landscape is more turbulent, vacillating constantly in …
Industries on the cyber war front line
ThreatTrack Security published a study that looks at the security vulnerabilities of two industries most often targeted by cybercrime: energy and financial services. 72% of …
Seagate Wireless Plus offers advanced cloud backup
The Seagate Wireless Plus mobile device storage now consists of a family of capacities at 500GB, 1TB and 2TB versions to suit every need along with integration with cloud …
Moves users get new privacy policy after Facebook deal
When Facebook acquired ProtoGeo Oy and its popular fitness app Moves, it was announced that “the Moves experience will continue to operate as a standalone app, and there …
Featured news
Resources
Don't miss
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research
- UTMStack: Open-source unified threat management platform
- LLMs are everywhere in your stack and every layer brings new risk
- Building SOX compliance through smarter training and stronger password practices