DDoS attack sizes plateau, complex multi-vector attacks on the rise
Arbor Networks released its 8th Annual Worldwide Infrastructure Security Report (WISR) offering a rare view into the most critical security challenges facing today’s …
48% of IT staff fear unauthorized access to virtual servers
Data security in visualized environments is often neglected by IT organizations, with 48% either reporting or suspecting unauthorized access to files on visualized servers, …
IT challenges with managing increasing amounts of data
Half of all organizations EVault surveyed in the USA, UK, France, Germany, and the Netherlands say they are managing more data now than they were a year ago, and 70 percent of …
People need help controlling personal info online
Microsoft released new data reflecting consumers’ perceptions about how their information is used online and a new series of short videos to help people better manage …
Most exploit kits originated in Russia, say researchers
58 percent of the vulnerabilities targeted by the most popular exploit kits in Q4 were more than two years old and 70 percent of exploit kits reviewed were released or …
DNS attacks increase by 170%
Radware identified a number of new attack methods representative of today’s increasingly sophisticated and severe DDoS threat. Their latest report highlights …
Embrace BYOD or die
Dell Quest Software announced the results of a global survey of IT executives to gauge the level of organizational maturity with existing BYOD strategies, along with realized …
The cloud will impact the way security is consumed
Increased adoption of cloud-based computing is expected to impact the way security is consumed as well as how key government agencies will prioritize security of public cloud …
Large-scale DDoS attacks grow bigger and more diversified
In addition to increasing attack sizes, attack volume grew in Q4 2012 and reached the highest number of attacks Prolexic has logged for one quarter. Traditional Layer 3 and …
Microsoft AVs not good enough, says AV-Test
AV-Test, the well-known independent organization that tests security software for home and corporate users, has released the results of the latest testing – and …
Embracing BYOD means understanding cloud and application security
Company policies supporting Bring Your Own Device are being widely embraced as a win-win initiative that improves employees’ experience and reduces IT costs, according …
Company bosses slacking on hacking
Company bosses across the UK have a complacent attitude toward cybercrime and are inviting criminal attacks due to their sloppy approach to internet security, reveals new …
Featured news
Resources
Don't miss
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise
- Signal blocks Microsoft Recall from screenshotting conversations
- The hidden gaps in your asset inventory, and how to close them
- CTM360 report: Ransomware exploits trust more than tech