According to a recent study from ISACA, one in five enterprises have experienced an APT attack. In addition, 94 percent of the 1,500 IT...
Hi, what are you looking for?
According to a recent study from ISACA, one in five enterprises have experienced an APT attack. In addition, 94 percent of the 1,500 IT...
For at least six weeks, a subdomain for the Los Angeles Times was redirecting visitors to a separate domain hosting the Blackhole Exploit Kit....
Multi-platform Malware Poses Threat to Android and Windows Users
According to a report from the National Audit Office (NAO), cybercrime in the UK cost taxpayers between £18 billion and £27 billion annually. The...
Earlier this month, SecurityWeek reported on the AP report citing two U.S. officials that claimed a National Intelligence Estimate (NIE) report would detail the...
According to a recent study from Symantec, employees who leave a job, on their own or due to being fired, tend to keep confidential...
According to a report from Bloomberg, President Obama could issue an executive order aimed at cybersecurity as soon as this week. Word if the...
If you need a one off example this week of why internal policies are important, or why failure to adhere to them could spell...
Adobe issued an update for its Flash Player on Thursday, which hardens the media player against two vulnerabilities being actively exploited. Of note, is...
On Thursday, as part of the ritual of advance notification, Microsoft announced its plans to address 57 security vulnerabilities within Windows, Internet Explorer, and...
Despite the fact that a majority of IT respondents say that their cloud deployments were successful, and have saved their respective organization's money, many...
After suffering a breach last week that impacted some 250,000 accounts, Twitter is looking to bolster security by investing in two-factor authentication. The news...