Lack of trust is affecting how consumers use the Internet
68% of US smartphone users are concerned about having their activity tracked to serve them targeted ads, suggesting that most smartphone users are uncomfortable with the idea …
Concerns around endpoint security
The overwhelming majority of information security professionals believe end users are their biggest security headache, largely due to their tendency to click on suspicious and …
Don’t wait until you’re attacked to take cybersecurity seriously
CISOs foresee cyber terrorism and cybercrime posing significant risks to their organizations over the next three years, according to Raytheon and the Ponemon Institute. The …
Cyber readiness across government and critical infrastructure industries
While the frequency and severity of cyberattacks against organizations are on the rise, a majority of IT leaders do not feel confident in their leaderships’ ability to …
Visual hacking exposed
While most security professionals focus on thwarting data breaches from cyber attacks, a new study exposes visual hacking, a low-tech method used to capture sensitive, …
Endpoint security becoming critical focus area
Detecting and responding to modern threats on endpoints has become a key business priority according to a survey by the Enterprise Strategy Group. They polled 340 IT and …
1 billion data records compromised in data breaches
More than 1,500 data breaches led to one billion data records compromised worldwide during 2014, according to Gemalto’s Breach Level Index (BLI). These numbers represent …
The limits of prevention-centric security programs
In an analysis of tens of thousands of malicious files, Damballa discovered that it can take more than six months for traditional AV tools to create signatures for 100% of the …
Phishing attacks increasingly target financial data
28.8 percent of phishing attacks last year aimed to steal financial data from consumers, according to a new report by Kaspersky Lab. The results show how cybercriminals have …
Increase in enterprise cloud adoption and data risk
Skyhigh Networks analyzed actual cloud usage data from over 15 million enterprise employees across 350 enterprises. Although they found a record high percentage of cloud …
Dangerous vulnerabilities plague IoT home security systems
Owners of Internet-connected home security systems may not be the only ones monitoring their homes. A new HP study found that 100 percent of the studied devices used in home …
Unsurprisingly, adults don’t read terms and conditions of mobile apps
Today, we spend more time on our smartphones and tablets than ever before, downloading games on the go, banking online or conducting the weekly grocery shop. However, despite …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform