Please turn on your JavaScript for this page to function normally.
Complex malware and BYOD drive mobile security

Mobile malware has advanced to a new level of sophistication as smart devices continue to gain ground. The number of unique mobile threats grew by 261% in just two quarters. …

8 in 10 companies suffered web-borne attacks

The vast majority of organizations that allow employees to freely access the Web are experiencing high rates of malware threats, including phishing attacks, spyware, …

Worldwide IT spending to reach $3.8 trillion in 2013

Worldwide IT spending is projected to total $3.8 trillion in 2013, a 4.1 percent increase from 2012 spending of $3.6 trillion, according to the latest forecast by Gartner. …

A look at how consumers safeguard their devices

While consumers who have lost a smartphone or had one stolen in the past are significantly more likely to be taking basic protective measures with their current device, nearly …

Spam filters are blocking less spam

Virus Bulletin announced the results of its latest anti-spam comparative review: 17 solutions achieved a VBSpam award, but the majority did so with a lower spam catch rate …

Most IT admins considering quitting due to stress

The number of IT professionals considering leaving their job due to workplace stress has jumped from 69% last year to 73%, underlining the increasingly challenging business …

Federal agencies willing, but not ready, for Big Data

More than 75 percent of federal managers believe Big Data has the power to fundamentally transform federal operations, according to the Government Business Council (GBC) and …

European ATM Security Team on fraud losses

European ATM Security Team (EAST) has published its first European Fraud Update for 2013. This is based on country crime updates given by representatives of 21 countries in …

Real-time apps and FTP are preferred malware targets

Palo Alto Networks published an analysis of new and evasive malware in live enterprise networks. Their findings show that traditional antivirus solutions are not identifying …

Targeted attacks and real world hacks

Web application attacks are the most significant security threat for IT infrastructures, according to Alert Logic. During a six-month study period, Alert Logic found that 48 …

Employees deliberately ignore security rules

A recent survey from Lieberman Software reveals that more than 80% of IT security professionals believe that corporate employees deliberately ignore security rules issued by …

What do users look for in a security solution?

Users are aware of the dangers in the Internet and most of them are already using a security solution, say the results of AV-Comparatives’ annual survey that polled …

Don't miss

Cybersecurity news