IT budgets in 2010 to be at 2005 levels
IT budgets will essentially be flat in 2010, increasing by a weighted global average of 1.3 percent in nominal terms, compared with 2009 levels where IT budgets declined 8.1 …
South Korea preparing for cyber war
South Korea is determined not to be caught off guard again when it comes to cyber attacks directed against her. Mimicking the US defensive steps, the South Korea Ministry of …
Secure computing on a USB flash drive
The new IronClad USB drive shrinks a laptop’s hard drive – including the entire operating system, software applications, and files – onto a secure flash …
Four information management roles IT departments need
Gartner has identified four information-management roles that IT departments need to establish and recruit from outside the IT team in a major trend that will affect both IT …
Phishing attacks escalate, DIY cybercrime kits to blame
It used to be that cybercrime was almost exclusively perpetrated by individuals and groups who had in-depth knowledge about the techniques, mechanisms and technologies on …
Online cybercriminal DarkMarket closed, founder arrested
Who would have thought that Renukanth Subramaniam, a 33-year old former pizza bar worker and dispatch courier, was the founder and one of the site operators of DarkMarket, the …
Twitter message leads to police arrest
“It is the world we live in,” was the sentence that Paul Chambers was hearing all over again during his interrogation by UK law enforcement regarding his imprudent …
Week in review: Google and Adobe hacked by China, threats 2.0 and rogue Android applications
Here’s an overview of some of last week’s most interesting news and articles: Pay by password Verotel announced Verotel QuickCharge – a new tool for Internet …
8,378 reasons for better banking security
Reports that the Suffolk County Bank – a subsidiary of Suffolk Bancorp, the US financial institution – had its banking servers hacked last November were met with …
Attackers exploiting unpatched vulnerability in Internet Explorer
Microsoft is investigating a report of a publicly exploited vulnerability in Internet Explorer. There are active attacks attempting to use this vulnerability against Internet …
Top 3 tips for virtual infrastructure protection
Flexible infrastructure If you already have a disaster recovery solution in place make sure that it is flexible enough to be used for physical and virtual server platforms. …
Mobile security market to exceed $4 billion by 2014
Strong enterprise demand for data security is driving rapid growth in mobile device management services. According to a study by ABI Research, the number of smartphones …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations