Mobile Fraud Expected to Explode by 2017

Over the next few years, e-commerce conducted on mobile devices and apps is expected to surpass purchases through browsers on personal computers, rendering companies that have not secured their mobile transactions vulnerable to rampant fraud. This is according to a new study by J. Gold Associates, a market research firm that surveyed 250 organizations for its Read More »

IT Leaders Aren’t Addressing Security Threats

Many security leaders believe the next three years will determine if organizations can win the cyber-war.

Read More »

Security Threats Require More Action From CIOs

CIOs, CISOs and other executives need to take security a lot more seriously and turn to more advanced methods to detect potential problems.

Read More »

Why Schools Fail at IT Disaster Recovery Efforts

Educational institutions lag behind commercial businesses in preparedness for major IT disasters, according to a new study. Only 26 percent of IT professionals surveyed said they feel very prepared for such an event. One-third of IT professionals said their organization suffered a major incident requiring disaster recovery procedures, according to the report. Of those, 11 percent had... Read More »

How Shadow IT Transformed the Role of CIO

The majority of CIOs feel that their role is changing–and the rising trend of shadow IT is having a significant impact on this sentiment, according to a recent survey from BT Global Services. The report, titled "Art of Connecting: Creativity and the Modern CIO," indicates that CIOs must adapt due to shifting demands among... Read More »

When Security Breaches Come From Within

Although a majority of businesses worldwide admit their vulnerability to insider data breaches and expect to maintain or increase their IT security and data protection budgets, the logic underlying their solutions is unfocused, according to a new survey. They are spending hard-won budget dollars to protect relatively small amounts of sensitive data accessible through BYOD initiatives when... Read More »

Nine Facts You Might Not Know About Bot Traffic

Malicious impersonator bots are on the rise, one-third of all Websites are vulnerable to them, and RSS bots are going extinct, according to a new bot traffic report. The survey, "2014 Bot Traffic Report," is the third report conducted by security firm Incapsula. Its data is based on a sample of 15 billion... Read More »

Why Millennials Balk at Mobile Monitoring

Enterprises that monitor employees’ use of tablets and smartphones risk alienating workers, particularly millennials, and possibly causing a backlash, according to a new study. These young workers expect to use mobile devices for both work and personal activities and... Read More »

$215M Scam Goes After C-Suite Executives

An FBI alert shows how cyber-thieves research, monitor and study a business and its employees before the crime is committed.

Read More »

Mobile, IoT Face More Complex Attacks in 2015

Mobile malware samples jumped 16% in the third quarter of 2014 compared to malware discovered in the second quarter, according to a new report. Year over year, mobile malware increased by 76%. Conducted by McAfee Labs, which is now part of Intel Security, the quarterly report is included in McAfee Labs' "2015 Threats Predictions.” The Read More »

Read More From Our Security Archive »
Thanks for your registration, follow us on our social networks to keep up-to-date