Should the removal of personal info posted online be a human right?
69% of online Americans agree that the ‘Right to be Forgotten’ should be a human right, 29% think it allows for censorship. Only 16% think the ‘right to be …
EMEA organizations are being pre-emptive about security
In EMEA, organisations are being pre-emptive about security due to the increasing threat posed by targeted attacks. These threats take the form of cyber-attacks that lie …
What drives employees to shadow IT?
While 94 percent of knowledge workers recognize the importance of collaboration and 83 percent use technology to collaborate, 59 percent are not satisfied with the tools they …
81% of healthcare organizations have been compromised
Eighty-one percent of health care executives say that their organizations have been compromised by at least one malware, botnet, or other cyber-attack during the past two …
Unsurprisingly, most would support eliminating passwords
Password-based authentication is no longer capable of meeting the demands of modern information security, according to LaunchKey. An overwhelming 84% of respondents would …
How many employees present a cloud security risk?
Based on analysis across 10 million users, 1 billion files, and over 91,000 applications, CloudLock focused on the riskiest element in the cloud: user behavior.1 percent of …
Malvertising campaigns increase 325 percent
Cyphort investigated the practices used by cyber criminals to inject malicious advertisements into legitimate online advertising networks. Researchers found that malvertising …
Average financial services company uses 1,004 cloud applications
Skyhigh Networks analyzed cloud adoption in the financial services industry.The average financial services company uses 1,004 cloud services, which comes as a surprise to many …
Analyzing fraudulent and high-risk behaviour events
NuData Security announced new threat intelligence that provides insight into the latest trends in online fraud.Account takeover, in which fraudsters steal an established …
Unmanaged Apple devices are a liability for corporations
While people widely use Apple devices for work, lack of security and management of those devices exposes companies to significant liabilities, according to a new survey by …
Cybercriminals are becoming more creative
The second quarter of 2015 was wrought with high profile vulnerabilities and hacks. Cybercriminals became more inventive in their attack methods to infiltrate and abuse …
The rise of mobile transactions and online lending fraud
During Q2, ThreatMetrix examined cybercrime attacks detected during real-time analysis and interdiction of fraudulent online payments, logins and new account registrations. …
Don't miss
- Why cloud vulnerabilities need CVEs
- Making cybersecurity more appealing to women, closing the skills gap
- Building a strong cloud security posture
- Palo Alto firewalls: CVE-2024-3400 exploitation and PoCs for persistence after resets/upgrades
- Triangulation fraud: The costly scam hitting online retailers