Reported DDoS attacks up 200 percent
A new Akamai report provides insight into key global statistics including connection speeds, attack traffic, and network connectivity and availability, among many others. …
Week in review: CISPA, AP Twitter account hijacking and real-world consequences
Here’s an overview of some of last week’s most interesting news, reviews and articles: World’s largest bitcoin exchange under DDoS attack Mt.Gox, the …
U.S. judge says FBI can’t hack crime suspect’s computer
A judge of the U.S. District Court for the Southern District of Texas has denied FBI’s petition to install spying software on and using the built-in camera of an …
Who to call when hit by a DDoS attack
Recent reports all point to the same fact: despite the different motives of the attackers, DDoS attack have become more frequent and more intense. So what are businesses and …
CISPA is (practically) dead, says Senate representative
There’s finally some good news for CISPA opponents: according to a representative of the U.S. Senate Committee on Commerce, Science and Transportation, the Senate is …
Phishing attacks skyrocketing
A new phishing survey by the Anti-Phishing Working Group (APWG) reveals that phishers are breaking into hosting providers with unprecedented success, using these facilities to …
35% of businesses experienced a DDoS attack in 2012
When DDoS attacks hit, organizations are thrown into crisis mode. From the IT department to call centers, to the boardroom and beyond, it’s all hands on deck until the …
Data breaches increase IT budgets
Protecting brand reputation and observing security best practices should be organisation’s primary motivators for data protection, while meeting compliance requirements …
U.S. government doesn’t need CISPA to monitor communications
Civil rights and privacy advocates are mobilizing their forces to combat the passing of Cyber Intelligence Sharing and Protection Act (CISPA), but documents obtained by …
Hosted virtual desktops can increase security
One of the most commonly cited motivations for implementing hosted virtual desktops (HVDs) is to increase the security of end-user computing, according to Gartner. Properly …
Software for complex Android device security needs
Wind River has introduced three Solution Accelerators for Android Security that allow developers to quickly begin working on security requirements for Android-based devices. …
GFI Software adds patch management to GFI Cloud
GFI Software announced the addition of patch management capabilities to its cloud-based platform for the delivery of services via a web-based user interface. Small to …