Mobile malware, botnets and attacks on the cloud to rise
ESET has published its annual review of the past year’s threat trends and compiled predictions for 2013. According to the new report, the 2013 threatscape will see major …
Guidance on cybersecurity, private clouds and privacy
ISACA today issued guidance on managing three top trends posing major challenges to businesses in 2013: cybersecurity threats, private vs. public clouds and data privacy. …
Cloud exploits and mobile device attacks on the horizon
Although many security experts predict that the most likely data breach threats organizations will face in 2013 include cloud exploits, mobile device attacks and all-out cyber …
Exploits, security threats and hacks will mutate in 2013
Lamar Bailey, Director of Security Research and Development with nCircle, has released his top five security threats to watch out for in 2013. The New Year – and beyond …
88% of corporate databases vulnerable to cybercrime
GreenSQL revealed that 88 percent of all companies participating in its December survey do not protect their databases from both external and internal threats, and almost one …
Highest profile software failures of 2012
SQS compiled a list of the worst software failures over the past 12 months. This year’s annual survey is based on major software failures throughout 2012 and highlights …
Bans fail to prevent data leakage
TeamDrive is warning about the serious security risks being run by companies that ban document and file sharing services, such as Google Drive and Dropbox, without providing …
ENISA reports on smart grid cyber security measures
The EU’s cyber security agency ENISA has investigated the challenges for baseline smart grids protection in Europe. This new report assists smart grid providers to …
Many who use the cloud for work, don’t trust it for personal data
A survey by Lieberman Software revealed that half (51%) of IT experts whose job roles focus on the cloud don’t trust the cloud for any of their personal data such as …
Users still have a casual attitude regarding security
A Siber Systems survey of over 700 adults from the United States, the U.K., Germany and other countries shows a significant disconnect between how individuals perceive online …
Motivations, trends and measurement of IT security spending
A new comparative survey by The Ponemon Institute explores the motivations behind IT security spending among UK and US organizations, and how industry regulations, data breach …
IT security implications of key technology trends for 2013
Automated controls are increasingly being used by organizations to manage the cost of compliance and reduce their business risk believes Turnkey Consulting. Their latest …
Featured news
Resources
Don't miss
- Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools
- iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted