Users more worried about hacking than tracking
Internet users are highly concerned about the theft of personal and financial information and believe strongly that the federal government should do more to protect them, …
90-day spam campaign turns to Santa in December
Ninety days ago a substantial spam campaign focusing on dubious offers and fake prizes began, according to Commtouch. However since December 10, the campaign has been …
What’s the greatest security risk?
While boardrooms across the U.S. report growing prioritization of endpoint security, risk continues to grow and evolve and IT departments are racing to keep up, according to a …
How human behavior affects malware and defense measures
Installing computer security software, updating applications regularly and making sure not to open emails from unknown senders are just a few examples of ways to reduce the …
CIOs will continue to focus on business intelligence and analytics
The CIO focus on business intelligence (BI) and analytics looks set to continue through 2017, according to Gartner. Gartner said that the benefits of fact-based …
Gamers attacked 11.7 million times in 2013
Just days after the launch of the PlayStation 4 and the Xbox One, Kaspersky Lab experts have discovered that PC gamers across Europe were hit by a massive number of attacks in …
How competitive is your cybersecurity team?
SecureWorld Insight, a partnership with Ponemon Institute and SecureWorld Expo, identified compensation for eight categories of information security staff – from CISOs …
IT pros are playing cat and mouse with cybercriminals
IT professionals admit to feeling lost when it comes to trying to protect the company against cyber attacks and cybercriminals. This could be a big problem for all of us, as …
DDoS attacks escalate, businesses still unprepared
Many businesses are failing to take adequate measures to protect themselves against the threat of a DDoS attack. A Corero Network Security survey of 100 companies revealed …
Secure remote access trends
HOB announced the results of a new survey which quantifies the trends and pain points CTO’s and CIO’s in the United States experience when utilizing remote access …
Top 100 Android apps hacked in 2013
One hundred percent of the Top 100 paid Android apps and 56 percent of the Top 100 paid Apple iOS apps have been hacked, according to Arxan. As the growth in mobile innovation …
What do people want to hide on their smartphone?
More than half of Americans (52%) would be embarrassed about friends or family seeing certain files or documents on their smartphone, according to Clean Master. The number one …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
- Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down