The unfortunate breaches of information security defences during 2013 confirm that IT security professionals will be in demand for a long time to come.
Browsing: Malware and Vulnerabilities
The bottom line is hackers are focused on finding the vulnerabilities that have the most impact and potential.
HID Global has offered four tips for protecting organizations against the types of data breaches that recently occurred at Target and other major retailers.
What should users do about it? Upgrade, of course. But in the event that’s not practical or possible at the moment, then users should be super-mega vigilant
A third of IT security professionals do not keep corporate data in the cloud because of fear of government snooping
Following the news that Basecamp was hit by an extortion based DDoS attack, there are three comments below from security experts.
PandaLabs today released a warning of a malicious spam campaign making use of a story on the reputable BBC website to add credence to the phishing attempt.
Kaspersky Lab have revealed its Spam analysis for February 2014. It found that many malicious attachments in February’s spam came in emails
From a private perspective, as a user of the Internet in today´s Internet of Things, Windows XP will remain a security and privacy nightmare.
If there is one person in an organization that knows which information has to be protected against data loss or theft, the business manager is it.