Office workers clueless about IT in general
Many office workers are not as tech or security aware as they could be, according to a new survey. When asked what cloud computing meant, a quarter thought it was a data …
External cyber security risks to surpass insider threats
57 percent of global C-level executives agree that in the next one-to-three years, external threats such as cyber-criminals will become a greater security risk than insider …
IT data management concerns
LogLogic announced the findings to an IT Data Management survey carried out amongst 164 IT managers and directors. The research aims to establish how IT data is being managed …
Lack of admin rights mitigates most Microsoft vulnerabilities
The removal of administrator rights from Windows users is a mitigating factor in 75 percent of Critical Windows 7 vulnerabilities. Microsoft and its partners regularly …
Holes found in majority of leading network firewalls
Firewalls are well understood as the main barriers between an organization’s internal and external networks. Over the past 25 years, they have become the foundation of …
Enterprises don’t understand IT risk
A global survey of more than 1,240 IT decision makers at large enterprises – 72% of which have more than 1,000 employees – found that one third (33%) of …
7 steps to protect against online fraud
Of the three million respondents to a SonicWALL quiz, only 7.4% answered all of the questions correctly. When asked to determine whether a suspect email was a phishing e-mail …
Most global energy organizations suffered a breach
More than 75 percent of global energy organizations surveyed admit to having suffered at least one data breach over the last 12 months. Furthermore, 69 percent of …
The true scale of the insider threat
UK employees are likely to either maliciously or accidentally disclose confidential information about their employers to unauthorized personnel. A LogRhythm survey of 3000 UK …
Data breach mistakes feared more than attackers
Seventy percent of compliance professionals feel that their organizations are well or very well prepared to fend off malicious hacker attacks, however, their confidence wanes …
Top cybercrime weapon: Web exploit toolkits
HP identified a significant increase in the volume of organized cybercrime targeting data centers and networks, which can lead to financial and data loss. While there were …
Vulnerabilities in common web applications escalate
A new Cenzic report reveals widespread Web application vulnerabilities, with 2,155 discovered – a third of which have both no known solution and an exploit code publicly …
Featured news
Resources
Don't miss
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)