A leading Internet security provider recently released a report revealing how attackers exploit end-users’ human flaws
Browsing: Breaches
Like a lot of our fellow information security professionals, we’re once again attending the RSA Conference, being held this week in San Francisco.
However, BYOD as a practice does come with its share of pitfalls, the biggest being confidentiality and security of company data.
Pass-the-Hash attacks represent a significant risk to organizations because they are frequently used as an attack vector in advanced threats.
Tripwire, have announced a 240% increase in the amount of monetary contributions donated to Oregon charities in 2013 over 2012 contributions.
The Bring Your Own Device (or BYOD) policy allows employees to bring personally owned mobile devices (laptops, tablets, and smart phones) to their workplace
Target announced that 110 million customer cards had fallen into the hands of hackers. That means that 1 in 3 Americans was affected by this cyber attack.
Tenable Network Security, the leader in real-time vulnerability and threats management, have announced the results of a February 2014 commissioned study
McAfee have announced, McAfee Threat Intelligence Exchange, the first in the industry to orchestrate local and global threat intelligence information…
“We do not see the computer virus as something we should take seriously” – The CESG signal commented that the computer virus was only a passing nuisance!