Most executives don’t pay attention to cyber risks
The advanced findings from the latest 2012 Carnegie Mellon CyLab Governance survey of how corporate boards and executives are managing cyber risks reveals the issue is still …
Only 34% of businesses enforce encryption on removable devices
Imation revealed the results of a recent survey of 302 IT decision makers in the US and Canada, which say that 37 percent of them reported that their business had …
Compromised websites from a site owner’s perspective
Malicious actors are often able to compromise legitimate websites without the site owners’ knowledge: over 90% of respondents didn’t notice any strange activity, …
Careless management of crucial security instruments
A staggering 72% of respondents to a Venafi survey admitted that they have no automated process to replace compromised certificates. This means that if their CA vendor is …
10.8 million Android devices infected with malware
From 2010 to 2011, Android officially overtook Symbian as the most targeted mobile platform in the world by cyber criminals, according to NQ Mobile. In 2011, newer and more …
Password amnesia and online identity
The use of multiple passwords is posing a security risk to individuals and businesses alike, according to Ping Identity. A new study, which surveyed 2,000 consumers, …
Users don’t bother changing default passwords
Most people working with sensitive information want stricter security policies but rarely bother changing default, automatically generated and assigned passwords. To collect …
Security and SLAs, the biggest barrier to cloud adoption
45% of European IT decision makers view a lack of security and service level agreements (SLAs) as top concerns for moving to the cloud, according to a survey by Interxion. …
How mobile malware is maturing
Mobile malware has reached a new stage of maturation, according to Juniper Networks. Top findings from Juniper’s 2011 Mobile Threats Report are evidence of accelerating …
Malicious sites increase 240%
In 2011, the most significant evolution in the threat landscape was the use of malware networks, or malnets, to launch highly dynamic Web-based attacks, according to Blue Coat …
Smaller DDoS attacks can be deadlier than big ones
Contrary to conventional thinking that large bandwidth cyber attacks wreak the most damage on enterprises, security experts at Radware instead found that bigger problems …
Attackers use fake friends to blend into Facebook
A new Barracuda Labs study provides an example of an increasing number of attackers move to social networks to carry out their wares. The study analyzes a random sampling of …
Featured news
Resources
Don't miss
- Data-stealing VS Code extensions removed from official Marketplace
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools
- Third-party cyber risks and what you can do