Concerns about employee privacy for BYOD exposed
Business users are alarmed about employers’ ability to access and collect personally identifiable information (PII) through mobile devices, such as iPhones, iPads and …
Top 10 issues eroding cloud confidence
Findings from a joint Cloud Security Alliance (CSA) and ISACA survey show that government regulations, exit strategies and international data privacy dominate the Top 10 areas …
Analysis of nearly 1.7 billion shortened URL links
Web of Trust (WOT) completed an analysis of nearly 1.7 billion shortened URL links and found that the URL shortening services are often used to drive traffic to suspicious …
Nearly 50% organizations experienced document data loss
Nearly half of organizations experienced data loss from the world’s two most used e-mail and enterprise content management applications, Microsoft Exchange Server and …
Dissatisfaction with the current state of backup
ExaGrid Systems announced the results of a survey of 1,200 IT managers which shows widespread dissatisfaction with the capabilities of many existing backup systems to keep up …
Most 5 year olds already use an Internet enabled device
Children as young as five have easy access to an internet enabled device. A One Poll study of 2,000 parents of children aged 5 to 15 also shows six parents in ten frequently …
Mobile banking trends and hidden risks
While mobile banking apps are growing quickly in popularity, 68 percent of smartphone owners who have not yet adopted these apps are holding back due to security fears, while …
Big Data grows as data security shrinks
A report published by PricewaterhouseCoopers (PwC) has revealed that despite the growing issue of “Big Data,” most organisations are actually keeping looser tabs …
Moving federal mission-critical applications to the cloud
As federal agencies are making cloud progress, the early-adopters that are moving their mission-critical applications to the cloud are realizing cost savings and improved …
Deconstructing hacktivist operations and tools
Imperva released its September Hacker Intelligence report, which details the latest methods deployed by hackers to execute DDoS attacks by analyzing the technical tools and …
Darwin’s theory applies to malware
G Data’s new malware report shows a new and unexpected development in malware: the extreme growth of new malicious programs seems to be slowing down. Granted, the …
Phishers continue to target legitimate websites
Attackers confidently exploit legitimate websites with the same methods and that they succeed because victims are not implementing recommended best practices, countermeasures …
Featured news
Resources
Don't miss
- Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools
- iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted