The NotCompatible mobile malware has reached a new level of sophistication, according to a new report from San Francisco-based mobile security company Lookout, Inc.
Maria Korolov |
22 Nov |
Read more
Hackers will use malware, among other techniques, to break into enterprise systems but once they're in, they're likely to switch away from malware to abusing privileged accounts, according to a report released today by CyberArk Software, Ltd., an Israel-based vendor of security solutions for privileged accounts.
Maria Korolov |
20 Nov |
Read more
Vietnam, India and Indonesia might not have the most advanced Internet infrastructure, but they do have a large number of insecure smartphones coming online, making them the big botnet sources for next year's distributed denial of service attacks, according to a report released today by Black Lotus Communications, a DDOS mitigation vendor.
Maria Korolov |
20 Nov |
Read more
Scammers routinely try to take advantage of humanitarian disasters to get people to open phishing emails, or to donate money to fake organizations.
Maria Korolov |
19 Nov |
Read more
"This year was the year of the breach," ISACA international president Robert Stroud told CSO Online.
Maria Korolov |
14 Nov |
Read more
Hackers are gearing up for the big holiday shipping season with a new collection of email that are just too good not to click on.
Maria Korolov |
12 Nov |
Read more
Higher proportions of employee theft and shoplifting as a share of all retail losses, combined with higher spending on loss prevention, resulted in a 27 percent increase of the cost of retail crime in the United States, according to the latest global theft report.
Maria Korolov |
08 Nov |
Read more
Apple released detection signatures for the iWorm backdoor malware in early October, but researchers now say that the fix doesn't address existing infections, and also leaves open a door to potential new infections, as well.
Maria Korolov |
07 Nov |
Read more
According to the Open Security Foundation, three out of 10 of the all-time worst security breaches happened this year. That includes 173 million records from the NYC Taxi & Limousine Commission, 145 million records at Ebay, and 104 million records from the Korea Credit Bureau. And that's not counting the 1.2 billion user names and passwords reportedly stolen by Russian hackers, or the 220 million records recently discovered stolen from gaming sites in South Korea.
Maria Korolov |
04 Nov |
Read more
There's a dramatic shortage of qualified information security professionals in the industry today.
Maria Korolov |
22 Oct |
Read more
This year has been the best of times and the worst of times for open source code and security.
Maria Korolov |
02 Jul |
Read more
Women make up just 11 percent of information security professionals. Just increasing that number to 22 percent would solve the industry's staffing shortage problem.
Maria Korolov |
06 May |
Read more
Even as women have made dramatic advances in medicine, law, and other fields, the proportion of women pursuing undergraduate degrees in the computer sciences has actually been dropping, from around 30 percent in 1990 to 18 percent in 2010, according to the latest data from the National Science Foundation. As a result, according to the Census Bureau, women accounted for just 27 percent of computer science professionals — down from 34 percent in 1990.
Maria Korolov |
25 Mar |
Read more
Edward Snowden's leaks about NSA spying may have brought the issue of cloud security to broad public attention, but some enterprise users were already concerned about how to take advantage of cloud-based applications while keeping their data safe.
Maria Korolov |
16 Oct |
Read more
If your staffers simply need a note-taking application, Evernote is an obvious choice--it's the 800-pound gorilla, having grown in five years to 50 million users. But the program also offers an eclectic assortment of productivity features, and this is where its utility in business environments is much less obvious.
Maria Korolov |
15 Mar |
Read more