Blog Posts Tagged with "report"
April 13, 2011 Added by:Headlines
The first quarter of 2011 was also witness to a broad range of attempts to distribute malware, and increased malware levels overall. These attempts included malware sent through Facebook chat, or which used other wellknown brand-names such as T-Online and Xerox...
April 12, 2011 Added by:Headlines
Three of the six firewalls failed to stay operational when subjected to stability tests, five out of six didn't handle what is known as the Sneak ACK attack. According to NSS Labs, the performance claims presented in the vendor datasheets are generally grossly overstated...
April 11, 2011 Added by:Robert Siciliano
As smartphones continue replacing landlines and billions of new applications are downloaded, mobile crime, or mCrime, will inevitably increase. McAfee’s threat report for the fourth quarter of 2010 reveals steady growth of threats to mobile platforms...
April 07, 2011 Added by:Anthony M. Freed
In the case of defending critical infrastructure, translating security concerns for the CxO level needs to go beyond merely conveying network defense efforts in terms of mitigating enterprise risk, the conversation needs to touch on the issue of strengthening our national security...
April 01, 2011 Added by:Bill Gerneglia
Those are some of the findings of the 2010 US Cost of a Data Breach study from the Ponemon Institute. The benchmark study looked at the experiences of 51 US companies in 15 industry sectors; it's the sixth annual such survey done by Ponemon...
March 30, 2011 Added by:Global Knowledge
While the global economic recession of recent years has largely been replaced by a lethargic recovery, workers continue to be impacted by job loss, reduction in salary, or job change. IT professionals have felt the impact of these economic tremors along with the rest of their colleagues...
March 28, 2011 Added by:Headlines
Cybercriminals understand there is greater value in selling a corporations' proprietary information and trade secrets, which have little to no protection, making intellectual capital their new currency of choice...
March 10, 2011 Added by:Headlines
The results of the poll indicate that a significant portion of those who are assumed to be more security conscious than most still retain a certain level of complacency when it comes to security best practices...
March 09, 2011 Added by:Headlines
The study looked at the both the presence of a vulnerability and the length of time before remediation. The results showed that the websites were exposed 270 days of the year on average. Education sector websites lead the pack, followed by retail and social networking sites...
March 08, 2011 Added by:Mike Meikle
Social Engineering or Trust Exploitation is most effective tool for cyber-criminals. Whether it is through Facebook, Twitter, LinkedIn or via an infected URL, Social Engineering is the key vector in gaining access to privileged information...
March 08, 2011 Added by:Headlines
"System failure dropped nine points to 27 percent in 2010. This trend indicates organizations may be more conscientious in ensuring their systems can prevent and mitigate breaches through new security technologies and compliance with security policies and regulations..."
March 08, 2011 Added by:Headlines
"Botnets: 10 Tough Questions” is a policy-level distillation of ENISA’s consultation with top experts from all sides of the fight against botnets, including Internet Service Providers, security researchers, law enforcement, Computer Emergency Response Teams and anti-virus vendors...
March 06, 2011 Added by:Danny Lieberman
The UK government report UK Cyber crime costs UKP 27BN/year published on the BBC’s website offers a top-level breakdown of the costs of cybercrime to Britain and is one of the most dubious reports I have seen recently in a long list of security-vendor and political hype around the cyber crime story...
March 03, 2011 Added by:Headlines
"Attackers focus on where they can get the most eyeballs and profit, and today that means social networks and search engines. As a community we often point to the need for user education as the missing component..."
March 02, 2011 Added by:Headlines
“The Stuxnet worm, the first ‘industrial’ virus, was well-known for spreading via unsecure USB sticks. Furthermore, even if unprotected USB sticks are not infected with viruses or worms, they can contain sensitive corporate data, leaking important information to external organizations"...
February 17, 2011 Added by:Bill Gerneglia
A report by Javelin said the decline in victims and amount of identify fraud, which slid 34 percent from $56 billion to $37 billion, was probably due to the steep drop in reported data breaches, which were down from 604 cases in 2009, with 221 million records exposed, to 404 cases in 2010...
Israeli Military and Hamas trade Hacking Att... lara croft on 07-31-2014
Cyphort Detects Surge in Ad Network Infectio... smith alexander on 07-30-2014
"Fake ID" Android Vulnerability in Lets Mali... smith alexander on 07-30-2014