Blog Posts Tagged with "report"

69dafe8b58066478aea48f3d0f384820

Email Malware Increases 400% Since Rustock Takedown

April 13, 2011 Added by:Headlines

The first quarter of 2011 was also witness to a broad range of attempts to distribute malware, and increased malware levels overall. These attempts included malware sent through Facebook chat, or which used other wellknown brand-names such as T-Online and Xerox...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Analysis Shows Firewalls Fail to Deliver as Promised

April 12, 2011 Added by:Headlines

Three of the six firewalls failed to stay operational when subjected to stability tests, five out of six didn't handle what is known as the Sneak ACK attack. According to NSS Labs, the performance claims presented in the vendor datasheets are generally grossly overstated...

Comments  (2)

37d5f81e2277051bc17116221040d51c

mCrime Takes A Leap Into Profitability For Criminals

April 11, 2011 Added by:Robert Siciliano

As smartphones continue replacing landlines and billions of new applications are downloaded, mobile crime, or mCrime, will inevitably increase. McAfee’s threat report for the fourth quarter of 2010 reveals steady growth of threats to mobile platforms...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Report Shows Energy Infrastructure Susceptible to Attack

April 07, 2011 Added by:Anthony M. Freed

In the case of defending critical infrastructure, translating security concerns for the CxO level needs to go beyond merely conveying network defense efforts in terms of mitigating enterprise risk, the conversation needs to touch on the issue of strengthening our national security...

Comments  (1)

44fa7dab2a22dc03b6a1de4a35b7834a

Costly Malicious Data Breaches On the Rise

April 01, 2011 Added by:Bill Gerneglia

Those are some of the findings of the 2010 US Cost of a Data Breach study from the Ponemon Institute. The benchmark study looked at the experiences of 51 US companies in 15 industry sectors; it's the sixth annual such survey done by Ponemon...

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

IT Skills and Salary Report 2011 from Global Knowledge

March 30, 2011 Added by:Global Knowledge

While the global economic recession of recent years has largely been replaced by a lethargic recovery, workers continue to be impacted by job loss, reduction in salary, or job change. IT professionals have felt the impact of these economic tremors along with the rest of their colleagues...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hackers Focusing on Corporate Intellectual Capital

March 28, 2011 Added by:Headlines

Cybercriminals understand there is greater value in selling a corporations' proprietary information and trade secrets, which have little to no protection, making intellectual capital their new currency of choice...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Infosec Pro's Need to Practice What They Preach

March 10, 2011 Added by:Headlines

The results of the poll indicate that a significant portion of those who are assumed to be more security conscious than most still retain a certain level of complacency when it comes to security best practices...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Report: Websites Remain Vulnerable to Attacks

March 09, 2011 Added by:Headlines

The study looked at the both the presence of a vulnerability and the length of time before remediation. The results showed that the websites were exposed 270 days of the year on average. Education sector websites lead the pack, followed by retail and social networking sites...

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

Research Roundup: Cisco’s Annual Report 2010

March 08, 2011 Added by:Mike Meikle

Social Engineering or Trust Exploitation is most effective tool for cyber-criminals. Whether it is through Facebook, Twitter, LinkedIn or via an infected URL, Social Engineering is the key vector in gaining access to privileged information...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Average Cost of a Corporate Data Breach $7.2 Million

March 08, 2011 Added by:Headlines

"System failure dropped nine points to 27 percent in 2010. This trend indicates organizations may be more conscientious in ensuring their systems can prevent and mitigate breaches through new security technologies and compliance with security policies and regulations..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

ENISA Releases Comprehensive Study on Botnet Threat

March 08, 2011 Added by:Headlines

"Botnets: 10 Tough Questions” is a policy-level distillation of ENISA’s consultation with top experts from all sides of the fight against botnets, including Internet Service Providers, security researchers, law enforcement, Computer Emergency Response Teams and anti-virus vendors...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Cyber Crime Costs Over $1 Trillion Globally?

March 06, 2011 Added by:Danny Lieberman

The UK government report UK Cyber crime costs UKP 27BN/year published on the BBC’s website offers a top-level breakdown of the costs of cybercrime to Britain and is one of the most dubious reports I have seen recently in a long list of security-vendor and political hype around the cyber crime story...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

One in Five Search Engine Topics Lead to Malware

March 03, 2011 Added by:Headlines

"Attackers focus on where they can get the most eyeballs and profit, and today that means social networks and search engines. As a community we often point to the need for user education as the missing component..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Majority of Workers Plug Unknown USBs Into Office PCs

March 02, 2011 Added by:Headlines

“The Stuxnet worm, the first ‘industrial’ virus, was well-known for spreading via unsecure USB sticks. Furthermore, even if unprotected USB sticks are not infected with viruses or worms, they can contain sensitive corporate data, leaking important information to external organizations"...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Identity Fraud Cases and Costs Plummeted Last Year

February 17, 2011 Added by:Bill Gerneglia

A report by Javelin said the decline in victims and amount of identify fraud, which slid 34 percent from $56 billion to $37 billion, was probably due to the steep drop in reported data breaches, which were down from 604 cases in 2009, with 221 million records exposed, to 404 cases in 2010...

Comments  (0)

Page « < 6 - 7 - 8 - 9 - 10 > »