Kaspersky Lab has issued its report for June 2014, which reviews all the spam, malware, and phishing attacks that occurred that month.
Author: ISBuzz Team
Andrew Agnes, Thom Langford & Javvad Malik, Founding Members of Host Unknown, weigh in on how the US Patriot Act and EU data laws affect user privacy.
Veracode has announced that research conducted by IDG revealed that UK application security programmes are lagging behind the US.
It has been a few weeks since the original discovery of the Dyre malware, and the attackers have sent another wave of phishing, reports PhishMe.
Fiesta and other exploit kits represent a potent threat to organizations, consumers and their sensitive data, says Proofpoint.
Sestus has advised users to treat business centre PCs and networks as hostile and to be vigilant.
Though packet capture is great, it does have some limitations that need to be recognized for forensics.
Emulex study shows that 45% of IT staffs monitor network and application performance manually, instead of implementing proven network monitoring tools.
BYOD can be complicated, but with a few helpful tips, enterprises can implement and maintain an effective BYOD initiative.
In the case of cybersecurity, we are better protected when we work together, that is, when we share intelligence about the latest cyber threats.