August 17, 2016
Via: Dark ReadingNew Duo Security study shows many companies don’t update browsers and operating systems – a first line of defense. Tests prove that people just keep clicking on malicious links and attachments: in a new study from Duo Security based on […]
August 10, 2016
Via: Dark ReadingResearchers prove that people can be fooled just because they want to know what’s on the other end of that email. Here are three steps you can take without spending too much money. If it was curiosity that killed the […]
August 2, 2016
Via: CSO OnlinePasswords are a problem, and yet they’re the primary means of authentication used when at work or at home. Recently, Salted Hash examined 126,357 passwords for accounts compromised during Phishing attacks in 2016. What we discovered was both sad and […]
July 7, 2016
Via: CSO OnlineA new study conducted by the Ponemon Institute and sponsored by password management provider Keeper Security analyzed the state of cyber-security in small and medium-sized businesses (SMBs) and found that confidence in SMB security is shockingly low (just 14% of […]
June 8, 2016
Via: Dark ReadingNew White Hat study shows critical vulnerabilities aren’t fixed any faster than other security flaws. Even after hearing years of dire warnings about the dangers of critical application vulnerabilities, enterprises are still falling down at the job of prioritizing risk […]
June 8, 2016
Via: Help Net SecurityAn analysis of phishing email campaigns from the first three months of 2016 has seen a 6.3 million increase in raw numbers, due primarily to a ransomware upsurge against the last quarter of 2015. That is a 789% jump. PhishMe […]
June 2, 2016
Via: Help Net SecurityU.S. business leaders are unprepared for the increased threat to information security that comes with flexible office environments. A Shred-it study shows that leaders are not providing the protocols and training needed to ensure information remains secure in a mobile […]
May 16, 2016
Via: SC MagazineFor the second consecutive year, Ponemon Institute’s annual study on the state of security and privacy in health care found that cyber-crime was the leading cause of data breaches among hospitals and other medical providers. According to the “Sixth Annual […]
March 31, 2016
Via: Help Net SecuritySecurity researchers have discovered 1,418 vulnerabilities in CareFusion’s Pyxis SupplyStation system – automated cabinets used to dispense medical supplies – that are still being used in the healthcare and public health sectors in the US and around the world. The […]
March 9, 2016
Via: Security IntelligenceIt’s becoming virtually impossible to escape mobile apps. As a consumer, every time you go shopping, attend a major event, post content to social media or listen to the radio, you’re encouraged to download new, customized applications from content providers. […]
February 29, 2016
Via: Help Net SecurityWhile data breaches make great headlines, what is often missing from those reports are the details on how the attackers got into the organization in the first place. Mobile devices can be a critical part of any cyber attack. Based […]
February 24, 2016
Via: Help Net SecurityCyberEdge Group surveyed 1,000 IT infosec decision makers and practitioners from 10 countries, five continents, and 19 industries, and unsurprisingly, the news is not good. In fact, network breaches are rising, confidence is falling, the number of BYOD deployments is […]
February 16, 2016
Via: Security IntelligenceMany customers, IT managers and CIOs still do not recognize mobile malware as an imminent threat. According to a study from Duo Security, one-third of mobile Android users do not use any lock screen passcode on their device, and most […]
February 1, 2016
Via: Help Net SecuritySmart grids provide real-time information on the grid, perform actions when required without any noticeable lag, and support gathering customer consumption information. On the downside, smart grids however, provide an increased attack surface for criminals. For instance, smart meters can […]
January 27, 2016
Via: Help Net SecurityWith acceptance of mobile and other new forms of payments expected to double in the next two years, a new global study shows a critical need for organizations to improve their payment data security practices. This is according to a […]
January 18, 2016
Via: The HillThe Department of Homeland Security investigated almost twice as many cyberattacks on the nation’s critical manufacturing sector in fiscal year 2015 as the year before, according to a new government report. Critical manufacturing includes automakers, aviation equipment manufacturers and producers […]
October 15, 2015
Via: network-securityThe average homeowner and parent would not leave their home unlocked with criminals in the area nor would they let their children wander about with predators on the loose, but when it comes to protecting their home and kids online […]
September 21, 2015
Via: data-lossAlthough a majority of data compromises come from external actors, including nation-state groups and cyber-crime gangs, #internal #employees account for 43 percent of #data loss, half of the time these leaks are accidental, a new #study from #intel security indicates. […]
August 4, 2015
Via: identity-theftThe online advertising industry has witnessed the emergence of “invisible enemies” that pass themselves off as regular online users – the infamous bots. This network of zombie users has become a serious headache for businesses and this is reflected in […]
July 26, 2015
Via: application-securityThere’s a shark tracker put out by the conservationists at OCEARCH that ties together the data emitted by tagged sharks, displaying the wanderings of the apex predators to fans. Now, thanks to Google, you too can consider yourself tagged. Google […]