Microsoft AVs not good enough, says AV-Test
AV-Test, the well-known independent organization that tests security software for home and corporate users, has released the results of the latest testing – and …
Embracing BYOD means understanding cloud and application security
Company policies supporting Bring Your Own Device are being widely embraced as a win-win initiative that improves employees’ experience and reduces IT costs, according …
Company bosses slacking on hacking
Company bosses across the UK have a complacent attitude toward cybercrime and are inviting criminal attacks due to their sloppy approach to internet security, reveals new …
CIOs agree: Digital technologies are top priorities
Enterprises realize on average only 43 percent of technology’s business potential, according to a global survey of CIOs by Gartner’s Executive Programs. That …
Increase in targeted spam and phishing attacks via e-mail
The threat level in the field of e-mail security increased in 2012 and will continue to do so in 2013 – despite the fact that spam levels decreased by 53% in 2012 as …
Data breaches erode trust in business
Recurring data breaches over the past five years have undermined public trust in the ability of both private firms and Government organisations to safeguard personal …
Corporate risk hotspots identified
Corporate risk prevention consultancy Riskskill, a division of UKFraud, has opened the New Year with a list of what they believe are the 8 biggest corporate risk hotspots …
Businesses overconfident about cyber security
Recent research from Deloitte has highlighted that firms in technology, media and telecommunications are confident that they are safe from cyber attacks and data security …
ENISA summarizes 120 threat reports, identifies top trends
The EU’s cyber security agency ENISA has published the first Cyber Threat Landscape analysis of 2012, summarizing over 120 threat reports. The report identifies and …
The threat landscape continues to expand rapidly
ThreatMetrix announced cybersecurity trends and risks businesses and consumers must keep top of mind in 2013. These include cyberwarfare, data breaches, migrating malware, …
Trends in mobile ransomware, large-scale attacks and hacktivism
McAfee today released its annual 2013 Threat Predictions report, highlighting the top threats McAfee Labs foresees for 2013. In the coming year, McAfee Labs expects that …
Only 8% of UK organizations have BYOD policies in place
As enhanced efficiency, employee productivity and the reduced burden on IT teams continue to drive adoption of Bring Your Own Device (BYOD), a recent survey of more than 500 …
Featured news
Resources
Don't miss
- Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools
- iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted