Advertisement
Top

Tag: study


Access control, Phishing

The Real Reason Phishing Works So Well

August 17, 2016

Via: Dark Reading

New Duo Security study shows many companies don’t update browsers and operating systems – a first line of defense. Tests prove that people just keep clicking on malicious links and attachments: in a new study from Duo Security based on […]


Phishing

Spearphishing: It’s Curiosity That Makes Them Click

August 10, 2016

Via: Dark Reading

Researchers prove that people can be fooled just because they want to know what’s on the other end of that email. Here are three steps you can take without spending too much money. If it was curiosity that killed the […]


Access control, Phishing

Salted Hash: Phishing study reveals frightening password habits

August 2, 2016

Via: CSO Online

Passwords are a problem, and yet they’re the primary means of authentication used when at work or at home. Recently, Salted Hash examined 126,357 passwords for accounts compromised during Phishing attacks in 2016. What we discovered was both sad and […]


Data loss

Study: More than 50% of SMBs were breached in the past year

July 7, 2016

Via: CSO Online

A new study conducted by the Ponemon Institute and sponsored by password management provider Keeper Security analyzed the state of cyber-security in small and medium-sized businesses (SMBs) and found that confidence in SMB security is shockingly low (just 14% of […]


Vulnerabilities

Enterprises Still Don’t Base Vuln Remediation On Risk

June 8, 2016

Via: Dark Reading

New White Hat study shows critical vulnerabilities aren’t fixed any faster than other security flaws. Even after hearing years of dire warnings about the dangers of critical application vulnerabilities, enterprises are still falling down at the job of prioritizing risk […]


Malware, Phishing

789% year-over-year spike in malware and phishing

June 8, 2016

Via: Help Net Security

An analysis of phishing email campaigns from the first three months of 2016 has seen a 6.3 million increase in raw numbers, due primarily to a ransomware upsurge against the last quarter of 2015. That is a 789% jump. PhishMe […]


Mobile security

Mobile workforce exposes businesses to security vulnerabilities

June 2, 2016

Via: Help Net Security

U.S. business leaders are unprepared for the increased threat to information security that comes with flexible office environments. A Shred-it study shows that leaders are not providing the protocols and training needed to ensure information remains secure in a mobile […]


Data loss

Ponemon: 89% of surveyed health care orgs breached in last two years; cybercrime top cause

May 16, 2016

Via: SC Magazine

For the second consecutive year, Ponemon Institute’s annual study on the state of security and privacy in health care found that cyber-crime was the leading cause of data breaches among hospitals and other medical providers. According to the “Sixth Annual […]


Vulnerabilities

1,400+ vulnerabilities found in automated medical supply system

March 31, 2016

Via: Help Net Security

Security researchers have discovered 1,418 vulnerabilities in CareFusion’s Pyxis SupplyStation system – automated cabinets used to dispense medical supplies – that are still being used in the healthcare and public health sectors in the US and around the world. The […]


Application security

Most Organizations ‘Don’t Know What They Do Know’ When Assessing Application Security Risk

March 9, 2016

Via: Security Intelligence

It’s becoming virtually impossible to escape mobile apps. As a consumer, every time you go shopping, attend a major event, post content to social media or listen to the radio, you’re encouraged to download new, customized applications from content providers. […]


Data loss, Mobile security

A mobile data breach could cost you $26.4 million

February 29, 2016

Via: Help Net Security

While data breaches make great headlines, what is often missing from those reports are the details on how the attackers got into the organization in the first place. Mobile devices can be a critical part of any cyber attack. Based […]


Privacy protection

Perceptions and buying practices of infosec decision makers

February 24, 2016

Via: Help Net Security

CyberEdge Group surveyed 1,000 IT infosec decision makers and practitioners from 10 countries, five continents, and 19 industries, and unsurprisingly, the news is not good. In fact, network breaches are rising, confidence is falling, the number of BYOD deployments is […]


Malware, Mobile security

Mobile Malware on Smartphones and Tablets: The Inconvenient Truth

February 16, 2016

Via: Security Intelligence

Many customers, IT managers and CIOs still do not recognize mobile malware as an imminent threat. According to a study from Duo Security, one-third of mobile Android users do not use any lock screen passcode on their device, and most […]


Network security

Defending the smart grid: What security measures to implement

February 1, 2016

Via: Help Net Security

Smart grids provide real-time information on the grid, perform actions when required without any noticeable lag, and support gathering customer consumption information. On the downside, smart grids however, provide an increased attack surface for criminals. For instance, smart meters can […]


Privacy protection, Security

The dismal state of payment data security

January 27, 2016

Via: Help Net Security

With acceptance of mobile and other new forms of payments expected to double in the next two years, a new global study shows a critical need for organizations to improve their payment data security practices. This is according to a […]


Cyber warfare

DHS: Cyberattacks on critical manufacturing doubled in 2015

January 18, 2016

Via: The Hill

The Department of Homeland Security investigated almost twice as many cyberattacks on the nation’s critical manufacturing sector in fiscal year 2015 as the year before, according to a new government report. Critical manufacturing includes automakers, aviation equipment manufacturers and producers […]


Network security

Consumers oddly confident in their cybersecurity, even as their data is stolen

October 15, 2015

Via: network-security

The average homeowner and parent would not leave their home unlocked with criminals in the area nor would they let their children wander about with predators on the loose, but when it comes to protecting their home and kids online […]


Data loss

Internal employees account for 43 percent of data loss

September 21, 2015

Via: data-loss

Although a majority of data compromises come from external actors, including nation-state groups and cyber-crime gangs, #internal #employees account for 43 percent of #data loss, half of the time these leaks are accidental, a new #study from #intel security indicates. […]


Identity theft

Google, Facebook and Yahoo join forces to fight against scammers who inflate the clicks on their ads

August 4, 2015

Via: identity-theft

The online advertising industry has witnessed the emergence of “invisible enemies” that pass themselves off as regular online users – the infamous bots. This network of zombie users has become a serious headache for businesses and this is reflected in […]


Application security

Worried about Google’s Your Timeline? Here’s how to disable tracking

July 26, 2015

Via: application-security

There’s a shark tracker put out by the conservationists at OCEARCH that ties together the data emitted by tagged sharks, displaying the wanderings of the apex predators to fans. Now, thanks to Google, you too can consider yourself tagged. Google […]