Global experiment exposes the dangers of using Wi-Fi hotspots
A global Wi-Fi hacking experiment exposed major security issues regarding the browsing habits of users around the globe. Avast mobile security experts traveled to cities in …
Security threats and the retail industry
Only 18 percent of retail IT security professionals are concerned that point of sale devices are being targeted by cyber criminals, and only 20 percent are …
A threat assessment of 7 million iOS and Android apps
Android malware is growing more pervasive, and iOS devices are also increasingly at risk. FireEye analyzed seven million mobile apps on both Android and iOS platforms from …
The shift to secure apps in the enterprise
As enterprises are mobilizing content and apps, they are also fortifying their cyber resiliency with accelerated activations of secure mobile apps, which grew 65 percent …
Medical identity theft affected two million victims in 2014
The number of patients affected by medical identity theft increased nearly 22 percent in the last year, an increase of nearly half a million victims since 2013. In the five …
The business and social impacts of cyber security issues
With multiple recent high profile attacks targeting household names and large employers, individuals increasingly fear cyber crime and its resulting consequences at work as …
Companies expects others to protect them against DDoS attacks
One in five businesses surveyed believe that their online services should be protected against DDoS attacks by their IT service providers (in particular, network providers). …
Known weaknesses plague the security threat landscape
Well-known issues and misconfigurations contributed to the most formidable threats in 2014, according to HP Security Research. “Many of the biggest security risks are …
Addressing cybersecurity business disruption attacks
Although the frequency of a cybersecurity attack on a large scale is low, by 2018, 40 percent of large enterprises will have formal plans to address aggressive cybersecurity …
Internet of Things adoption is gaining momentum
Enterprise adoption of the Internet of Things (IoT) is starting to gain momentum, fueled by a mix of technological, political and social factors. The declining costs of …
Insider threats continue to dominate
Ordinary employees, privileged users and the supply chain – such as contractors and third party service providers – are all conduits for a traditional insider …
96% say ISO 27001 is important for improving security defenses
Already established as international best practice, the information security management standard ISO 27001 has become an effective weapon in the fight against cyber crime. It …
Featured news
Sponsored
Don't miss
- Palo Alto firewalls: CVE-2024-3400 exploitation and PoCs for persistence after resets/upgrades
- Triangulation fraud: The costly scam hitting online retailers
- Tracecat: Open-source SOAR
- Why the automotive sector is a target for email-based cyber attacks
- eBook: Do you have what it takes to lead in cybersecurity?