Please turn on your JavaScript for this page to function normally.
Majority of companies suffered a web application security breach

Web application security incidents have become increasingly common and expensive, with the majority of companies experiencing at least one breach in the last 18 months and …

Android malware threats analysis

Bitdefender released its August 2012 Android malware threats report. While in August the percentage of adware-bundled apps dropped to 55.15 per cent, from July’s 77.34 …

Worldwide security infrastructure market will grow 8.4%

While the global economic slowdown has been putting pressure on IT budgets, security is expected to remain a priority through 2016, according to Gartner. Worldwide spending on …

The QR code: A new frontier in mobile attackability

A single poisoned link is all it takes to expose an entire organization to a full-scale attack. Hackers write sophisticated browser-based attacks that operate quite …

Every third computer in North America attacked while online

An in-depth analysis of the nature of cybercrime in North America and Western Europe in the first six months of 2012 by Kaspersky Lab found that the computers of 33.4% of …

39% of IT staff can get unauthorized access to sensitive information

IT professionals are allowed to roam around corporate networks unchecked, according to a survey of more than 450 IT professionals by Lieberman Software. It found that 39% of …

Jump in mobile app and banking scams

In August, GFI threat researchers identified a number of high-profile fake mobile application scams, along with a spike in email scams targeting UK banking and government …

Who is the most dangerous cyber celebrity?

Emma Watson has replaced Heidi Klum as McAfee’s 2012 most dangerous celebrity to search for online. For the sixth year in a row, McAfee researched popular …

Data breaches expose 94 million records in the government sector

An analysis of government breach data shows that the government sector reported 268 incidents of data breaches from January 1, 2009 to May 31, 2012, which exposed more than 94 …

87% have something to hide on their smartphones

When it comes to the almost weekly reports of celebrity phone hackings and leaks, more than half of consumers believe these are merely stunts to garner publicity. In the end, …

Zero-day-loving Google hackers furiously active in last three years

The hackers behind the Aurora attacks that were discovered targeting Google, Adobe and other big U.S. companies in 2009 have seemingly been working hard ever since. Symantec …

Dynamic hacking risks target web application security

Web applications remain the third most common attack vector overall, with hacking still on the increase, from organized criminal groups, amateurs and political activists. …

Don't miss

Cybersecurity news