Connections between personality types and phishing
Phishing scams are some of the most effective online swindles, hooking both savvy and naive computer users. New insights from researchers at the Polytechnic Institute of New …
Over 50% don’t protect their Android devices
Over 50 percent of Android-based smartphone and tablet owners do not use any security software to protect their devices against cyber-threats, according to Kaspersky Lab. This …
The motives behind nation state driven cyber attacks
FireEye released a report that describes the unique international and local characteristics of cyber attack campaigns waged by governments worldwide. “Cyber weapons are …
Average online bank account is accessed by 2.4 unique devices
Each month, The ThreatMetrix Global Trust Intelligence Network (The Network) screens more than 500 million site visitors, across more than 1,900 customers and 9,000 websites …
Challenges faced by top CSOs
(ISC)2 released new data that outlines the chief challenges faced by top enterprise security executives and illustrates the broad range of complex – and sometimes …
Users want a seamless experience in public Wi-Fi
With smartphone and tablet usage continuing to explode, operator-deployed Wi-Fi networks are playing an increasing role in keeping users connected on the go. A new study …
Industry leaders perceive numerous security threats to their data
An overwhelming majority of business leaders believe their customers and clients worry about breaches of personal data held by their organizations. Unisys-sponsored research …
Organizations fear their privacy activities are insufficient
The perceived level of maturity attached to organizations’ privacy activities has decreased since 2011, as many organizations deem their existing privacy activities to …
Organizations are flying blind as they embrace cloud services
Organizations lack the information to understand and mitigate a broader set of risks posed by the use of cloud services, according to Skyhigh Networks. “What we are …
Employees keep using personal cloud services to store work documents
Nearly 30% of employees are using personal cloud services to store work-related documents, according to a survey conducted at recent technology trade shows in which 5% of …
Java exploits jump, Android malware emerges outside app stores
A continued rise in exploit-based attacks, particularly against Java, and an increasing sophistication in mobile threats characterized the first half of 2013, which saw its …
Free Wi-Fi, but at what cost?
An investigation into public Wi-Fi has found that 51% of free Wi-Fi hotspots in the UK allow access to content of an adult nature. AdaptiveMobile examined Wi-Fi filtering …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains