Microsoft is packing more common vulnerability exposures into its critical bulletins, according to a new report from Portland, Ore.-based security researcher Tripwire, Inc.
Maria Korolov |
13 Feb |
Read more
Chinese adversaries were the most active state-sponsored cyberthreat groups last year, according to report released by CrowdStrike, but it was Vietnam, not the US, that was its top target.
Maria Korolov |
12 Feb |
Read more
Healthcare-related data breaches could not only be expensive, but also life-threatening, experts say, and traditional credit monitoring provides little protection.
Maria Korolov |
11 Feb |
Read more
Strategic data analytics can reduce shrinkage for retailers, restaurants and manufacturing companies by helping loss prevention pros use early warning indicators to stop problems before they start.
Maria Korolov |
11 Feb |
Read more
A new front has opened up in the Operation Pawn Storm cyber-espionage operation - an iOS app that spies on users, up to and including secretly turning on the phone's microphone to listen in to meetings and conversations.
Maria Korolov |
07 Feb |
Read more
The average company loses $US92.3 million a year to mobile fraud, according to a new survey of 250 companies from across a wide spectrum of industry verticals.
Maria Korolov |
06 Feb |
Read more
Criminal hackers aren't as smart as those portrayed in the movies and on TV, according to a new report from Sophos Ltd. -- but those behind advanced persistent threats are even dumber.
Maria Korolov |
05 Feb |
Read more
According to a new report sponsored by an IT performance management software vendor, federal agencies aren't spending as much as they should on battling internal threats -- the kinds of threats the vendor's software is designed to help protect against.
Maria Korolov |
04 Feb |
Read more
Unless you're living off the grid in a cabin in the woods -- and, if you're reading this, you're probably not -- you have more passwords than you can manage. They're all supposed to be long, complicated, unique, and difficult to guess. Oh, and you're supposed to change them all every three to six months.
Maria Korolov |
03 Feb |
Read more
Tired of having hackers guess your password in three tries and break into your most critical systems?
Maria Korolov |
03 Feb |
Read more
If you still haven't seen the new movie Michael Mann movie, Blackhat, with Chris Hemsworth playing the lead, you won't be getting any new insights into how hackers work.
Maria Korolov |
03 Feb |
Read more
The role of the CSO and CIO has been changing dramatically as technology becomes more and more vital to business strategies. Sometimes, it can be hard to keep up.
Maria Korolov |
31 Jan |
Read more
The size of the largest DDOS attack was fifty times larger last year than ten years ago, according to a new survey of Internet service and hosting providers, and attacks are also increasing in numbers and in sophistication.
Maria Korolov |
29 Jan |
Read more
The average organization spent $115 per user on security-related software last year, but $33 of it, or 28 percent, was underutilized or not used at all, according to a new report from Osterman Research.
Maria Korolov |
29 Jan |
Read more
Oracle's Java poses the single biggest security risk to US desktops, according to a new report from Copenhagen-based security vendor Secunia ApS, because of its penetration rate, number of vulnerabilities, and patch status.
Maria Korolov |
27 Jan |
Read more