Half of U.S. tax payers are unaware about identity theft risks
While consumers take steps to protect themselves against identity theft and remain concerned about the possibility of a data breach when sharing their personal information, …
Vulnerabilities surge: 8,000 recorded in 2010
IBM today released results from its annual X-Force 2010 Trend and Risk Report, highlighting that public and private organizations around the world faced increasingly …
Key security experts unfamiliar with DNSSEC
Half of IT personnel in charge of Internet security at the world’s largest organizations either haven’t heard of DNSSEC or have limited familiarity with it, …
Global spam drops by a third as Rustock botnet is dismantled
Symantec analysis reveals that in March, prior to its takedown, the Rustock botnet had been sending as many as 13.82 billion spam emails daily, accounting for an average of …
Intellectual capital is the new cybercrime currency
Cybercriminals understand there is greater value in selling a corporations’ proprietary information and trade secrets which have little to no protection making …
The crucial role of crypto technologies
Crypto technologies play a crucial role in data protection and compliance activities across a wide range of industry sectors, in both private and public organizations, …
73,000 malware strains created daily in 2011
The number of threats in circulation has risen in comparison to last year. In the first three months of 2011, PandaLabs identified an average of 73,000 new malware strains, …
Complexity as the leading security issue
Security complexity is the number one obstacle that organizations face today. Research from Check Point and the Ponemon Institute shows organizations struggle with a growing …
Best practices for identity theft services
With security breaches and identity theft cases frequently in the news, consumers are worried about becoming identity theft victims. Responding to this concern, dozens of …
Tough questions about botnets
ENISA published a comprehensive study on the botnet threat and how to address it. The report looks at the reliability of botnet size estimates and makes recommendations for …
The importance of metadata to prevent data leaks
A new IDC report highlights how the widespread use of collaborative content technologies is fueling the aggressive growth of unstructured and semi-structured data. While …
Twitter 11.6 hours survey scam spreading virally
Twitter users should be vigilant following the outbreak of a scam that is spreading links from users’ accounts without their knowledge. The scam, which has already …
Featured news
Resources
Don't miss
- Hackers love events. Why aren’t more CISOs paying attention?
- Before scaling GenAI, map your LLM usage and risk zones
- SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
- Why banks’ tech-first approach leaves governance gaps
- MDEAutomator: Open-source endpoint management, incident response in MDE