Security

Subscribe Archives >
 

China & U.S.Top the List of Cyber-Attack Sources

3 days ago | by Maggie O'Neill

This report offers insights into cyber-threats from around the world, including countries where the most attacks originate and nations that are most targeted. Read More

 
 
 
 
 
 

LATEST STORIES

  • Is Nothing Sacred?
     
    An assortment of apps are stealing data, tracking the location of users, sending unauthorized messages to contacts, and even making unauthorized phone calls.
     
    READ MORE
     
  • Is Your LinkedIn Profile at Risk?
     
    The social media service is a target for cyber-crime, and cyber-threat groups have created an extensive network of fake but convincingly real LinkedIn profiles.
     
    READ MORE
     
  • Where Is Today's Cyber-Security Leadership?
     
    We need to rethink convenience. In the rush for fast and easy, we've created a massive and expensive security problem that threatens the integrity of business.
     
    READ MORE
     
  • Is Our Trust in Mobile Apps a Mistake?
     
    Over the last decade, mobile technology has radically redefined our business and personal lives. Smartphones and tablets are ubiquitous, and mobile apps are everywhere. However, a recent survey by mobile security and analytics firm Bluebox found...
     
    READ MORE
     
  • New York City Credit Union Banks on Encryption
     
    To offer secure customer communications, the Melrose Credit Union deployed encryption services that include file transfers and integrate with existing workflows.
     
    READ MORE
     
  • Security Fears Delay Mobility Initiatives
     
    As mobility continues to sweep through the business world, users are taking whatever steps they have to—with or without management permission—to access the data and applications they need to do their job. This demand for anytime/anywhere...
     
    READ MORE
     
  • Enterprises Must Prepare for Nation State Attacks
     
    Today's cyber-security environment is rapidly going from bad to worse. Not only must organizations combat a steady stream of hacks and attacks from the outside while coping with insiders who intentionally or inadvertently put systems and data at...
     
    READ MORE
     
  • Manufacturing Danger
     
    Any electronic device connected to a network is potentially at risk, so security must be part of any design, engineering or manufacturing process from the start.
     
    READ MORE
     
  • Employees Ignore Risks of Online Holiday Shopping
     
    Regardless of the potential consequences, a great many employees shop for the holidays on both company computers and their personal mobile devices while on the job, according to a recent survey from CareerBuilder. A significant number of them will...
     
    READ MORE
     
  • Data Breaches: Myth vs. Reality
     
    Data breaches have become a persistent and unavoidable risk in the digital age. Businesses large and small—and across virtually every industry—find themselves increasingly in the crosshairs of hackers, thieves and state-sponsored...
     
    READ MORE
     
 
 
 
 
 

Security Archives >

 
 
Manage your Newsletters: Login   Register My Newsletters