8 out of 10 applications fail to meet security standards
Considered “low hanging fruit” because of their prevalence in software applications, XSS and SQL Injection are two of the most frequently exploited …
The most vulnerable smartphones
Bit9 highlighted the most vulnerable popular smartphones in use today. The devices on the list pose the most serious security and privacy risk to consumers and corporations. …
Insecure devices extend shopping risks
Shopping online for the holidays is up, with a 15 point increase in the percentage of Americans who say they will spend more time shopping online than in 2010. But according …
Disaster preparedness tips for computers
ISACA offers tips to the public and businesses to protect their computers, information and systems during a natural disaster. “Ensuring personal and employee safety is …
Employee-owned mobile devices are riskiest
More than half of information technology leaders in the US believe that any employee-owned mobile device poses a greater risk to the enterprise than mobile devices supplied by …
Featured news
Resources
Don't miss
- North Korea’s IT workers are targeting firms beyond tech, crypto, and the U.S.
- Google Drive for desktop will spot, stop and remedy ransomware damage
- Too many Cisco ASA firewalls still unsecure despite zero-day attack alerts
- Hackers love LOTL, this approach shuts them down
- A2AS framework targets prompt injection and agentic AI security risks