Please turn on your JavaScript for this page to function normally.
One in 10 secondhand hard drives contains personal information

One in ten secondhand hard drives contains residual personal data of its previous owner, revealed an investigation commissioned by the UK Information Commissioner’s …

Top enterprise security concerns and IT problems

A global study of more than 1,200 IT professionals in EMEA reveals that, in the last year, more than one in five enterprises has experienced a security breach and one in 10 …

Enhanced security awareness for tablet users

Cryptzone unveiled the latest release of NETconsent Compliance Suite, its policy management software. Recognising how difficult it is to raise IT security awareness amongst an …

A decade of vulnerabilities and predictions for 2012

Since 2001, Spanish security firm S21sec has been been compiling a database of vulnerabilities detected by themselves and those reported by a great number of sources which …

A new security strategy for Sony

2011 was a tough year for Sony. Having been attacked over 20 times by hacktivists going after its websites, the PlayStation Network, its customers’ and company …

Locate and analyze deployed digital certificates for free

Venafi announced the availability of Venafi Assessor, a downloadable, easy-to-install, free software solution that scans an organization ‘s network to locate and analyze …

The future of attacks on banking systems

If you’re a regular reader of our news site – or, indeed, any other that site that deals with information and computer security – you might sometimes get the …

Employees are deliberately disabling security controls

Corporate mobile devices and the bring-your-own-device (BYOD) phenomenon are rapidly circumventing enterprise security and policies, say the results of a new global study …

Most executives don’t pay attention to cyber risks

The advanced findings from the latest 2012 Carnegie Mellon CyLab Governance survey of how corporate boards and executives are managing cyber risks reveals the issue is still …

Only 34% of businesses enforce encryption on removable devices

Imation revealed the results of a recent survey of 302 IT decision makers in the US and Canada, which say that 37 percent of them reported that their business had …

Log management deserves a company’s respect

Keeping and maintaining data logs is a corporate best practice and, in many cases, when you consider regulation and industry standards, it’s the law. Still, few …

Self-selected PINs aren’t that hard to guess

Four-digit banking PINs are usually randomly assigned by banks after the issuing of credit and debit cards, but there are still some out there that let its customers choose …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools