Please turn on your JavaScript for this page to function normally.
Browser scan unveils an abundance of critical vulnerabilities

Through our Qualys BrowserCheck online tool we have collected data from over 1.4 million user computer scans and their respective browsers. From this research, we have found …

Malware creation hits record-high numbers

PandaLabs has published the results of its Quarterly Report for Q3 2013. One of the main conclusions that can be drawn from this global study is that malware creation has hit …

The rise of unsolicited and malicious emails

October saw spammers exploiting the themes of upcoming holidays, the names of well-known telecommunication service providers and the conflict in Syria, according to Kaspersky …

Do large companies follow encryption best practices?

Following last month’s revelations of the existence of the MUSCULAR program, in which the NSA and the British GCHQ have collaborated in tapping the overseas fiber-optic …

Top 10 data disasters from 2013

Kroll Ontrack announced its 11th annual list of the top 10 data disasters from 2013. For the last 11 years, the company has annually been collecting and publishing a list of …

New threats subverting digital signature validation

McAfee Labs found new efforts to circumvent digital signature app validation on Android-based devices. The McAfee Labs team identified a new family of mobile malware that …

The risks of having a false sense of security

Organizations are overwhelmingly confident in their readiness to combat security threats, but may not be prepared for dangers linked to new technology models and increasingly …

Only half of healthcare IT pros use formal risk assessments

Tripwire and the Ponemon Institute evaluated the attitudes of 1,320 respondents from IT security, IT operations, IT risk management, business operations, compliance/internal …

A look at security effectiveness by industry

BitSight analyzed security ratings for over 70 Fortune 200 companies in four industries – energy, finance, retail and technology. The objective was to uncover …

Uncontrolled privileged access still a major issue

The NSA’s notorious insider breach has caused 52 percent of IT security professionals to reconsider their approach to user and systems administrator privileges, yet the …

IT pros unsure of security risks when using remote support tools

Research from Bomgar and Ovum surveyed 300 IT decision-makers across the UK, France and Germany, focusing on the challenges faced by enterprise companies that provide remote …

90% of workers in Britain cannot resist clicking on a web link

90% of UK workers surveyed have clicked on a web link embedded in an email with two-thirds (66%) admitting they very rarely first check to ensure the link is genuine, …

Don't miss

Cybersecurity news