Cybercrime increasing faster than company defenses
Cybercrime threats posed to targeted organizations are increasing faster than many organizations can combat them. Moreover, a new survey suggests the threat of cybercrime is …
Are online profiles a danger to privacy?
The rapid proliferation of the use of social networking sites among adults 45 and older increases the need for awareness and education surrounding identity theft stemming from …
New books: Beautiful Testing, Core Data, RESTful Java with JAX-RS
Beautiful Testing offers 23 essays from 27 leading testers and developers that illustrate the qualities and techniques that make testing an art. Through personal anecdotes, …
Data breach costs increase
The 2009 Ponemon Institute benchmark study examines the costs incurred by 45 organizations after experiencing a data breach. Results were not hypothetical responses; they …
Using spam to beat spam
How to make a full-proof spam filter that will not block any of the legitimate email? A team at the International Computer Science Institute in Berkeley, California, and the …
Blippy, a great service for phishers?
Blippy, a new service that lets you twitter (blipper?) your recent purchases made with a credit card of your choice, could be a valuable tool for cyber criminals, warns …
Cloud computing brings changing security risks
Cloud-based services are fast becoming established as a credible alternative to existing server-based IT solutions but organizations are failing to recognize the new security …
Rogue software details: LiveProtection
LiveProtection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
China denies cyber attack on Google
The Chinese government has repudiated the claims that it has been involved in the recent attacks against Google and other US companies. According to BBC News, they say that …
Johnny Depp is not dead – but you might be infected
The fake news of the death of one of the most popular actors of today has been used by hackers to infect you with Trojans. According to Sophos’ Graham Cluley, the rumor …
IT spending to grow in 2010
A slow but steady improvement in the macroeconomic environment in 2010 should support a return to modest growth in overall IT spending, according to Gartner. Worldwide IT …
10 tips for securing the public sector
Those working in the public sector need to tackle key security issues if they want to avoid costly data breaches that impact both finances and reputation. Human error is …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage