Despite a high level of headline-grabbing hacks and the fact that criminal hackers run huge markets of information for sale upon request, most businesses whose confidential information has been hijacked don’t realize how much damage can be caused.
Browsing: Malware and Vulnerabilities
A recent survey shows that even before PRISM news broke, six out of ten consumers were concerned about the security of storing their content in social networking and cloud storage services.
Small business websites have overtaken porn and gambling sites as cyber criminals’ malware distribution tools of choice, according to Sophos director of technology James Lyne, who said the lack of skilled professionals to tackle this issue is leaving the UK wide open to attack.
Boardrooms need to “wake up” to the danger of cybercrime, according to a recent report.
File synchronisation services like Dropbox, Skydrive, iCloud and Ubuntu One are being increasingly used in organisations. The services themselves provide convenience and are often more secure than alternatives like email and FTP.
Today we have access to more information than ever before. With the huge resources of the Internet; a massive increase in cheap storage capacity; the phenomenal take up of Cloud computing and social media – new threats and vulnerabilities arise.
Intrusion attempts are more and more frequent and sophisticated, regardless of their targets (states or corporations). It’s in this context that international hacking events are multiplying.
A safety communication released today by FDA calls for device manufacturers and healthcare facilities to take more steps to reduce the possibility of cyber attack within medical devices.
Mobility in the enterprise has completely changed the IT security landscape, and organisations need to adopt new ways to respond to potential threats, according to IBM director of application, data, mobile, and infrastructure security, Caleb Barlow.
Last week’s Pentagon report disclosing the breach that allowed Chinese hackers to infiltrate some of America’s most advanced weapons systems reveals the U.S.’s gaping online vulnerabilities and compels U.S. leaders to make cyber-security an issue of national priority.