Quarter of firms can’t tell how hackers get in
The majority of large companies have experienced a breach over the past twelve months, but almost a quarter, 23 percent, of firms do not know…
Average business spends $15 million battling cybercrime
The average U.S. company of 1,000 employees or more spends $15 million a year battling cybercrime, up 20 percent compared to last year, according to…
Expired certificates cost businesses $15 million per outage
The average global 5,000 company spends about $15 million to recover from the loss of business due to a certificate outage — and faces another…
Does security awareness training even work?
The other day, I was in a room full of CIOs, CTOs and CISOs who — as an ice-breaking activity — were asked to share…
Does security awareness training even work?
The other day, I was in a room full of CIOs, CTOs and CISOs who — as an ice-breaking activity — were asked to share…
Healthcare firms three times more likely to see data breaches
Companies in the healthcare sector are three times more likely to encounter data theft than the average firm, according to a report released this morning.The…
Debit cards lag credit cards in EMV migration, putting banks at risk
Three times as many credit cards will be chip-enabled by the end of the year as debit cards, making the slower banks bigger targets for…
Russian military attacked, possibly by Chinese cyber group
Members of the Russian military have been receiving well-crafted phishing emails since mid-summer from attackers that use Chinese-language tools and Chinese command-and-control installations, according to…
As containers take off, so do security concerns
Containers offer a quick and easy way to package up applications and all their dependencies, and are popular with testing and development.According to a recent…
As containers take off, so do security concerns
Containers offer a quick and easy way to package up applications and all their dependencies, and are popular with testing and development.According to a recent…
As containers take off, so do security concerns
Containers offer a quick and easy way to package up applications and all their dependencies, and are popular with testing and development.According to a recent…
Corebot cleverly written botnet malware with growth potential
There’s a new botnet malware on the loose, called Corebot, that researchers believe has the potential to develop into a significant threat.The malware was first…
Corebot cleverly written botnet malware with growth potential
There’s a new botnet malware on the loose, called Corebot, that researchers believe has the potential to develop into a significant threat.The malware was first…
Travel apps riddled with security flaws
The top 10 travel apps in the iOS and Android app stores are all riddled with security flaws, according to a new report from Bluebox…
Roundabout Targeting
Consumer devices are the most vulnerable point for bank cyberattacks By Maria Korolov Cybercriminals who attack banks are more likely to focus on their online…
Attackers go on malware-free diet
To avoid detection, some hackers are ditching malware and living “off the land” — using whatever tools are already available in the compromised systems, according…
Attackers go on malware-free diet
To avoid detection, some hackers are ditching malware and living “off the land” — using whatever tools are already available in the compromised systems, according…
MIT scores worst in cybersecurity
In a cybersecurity survey of 485 large colleges and universities, the Massachusetts Institute of Technology came in at the bottom of the list.In a report…
MIT scores worst in cybersecurity
In a cybersecurity survey of 485 large colleges and universities, the Massachusetts Institute of Technology came in at the bottom of the list.In a report…
Security experts mostly critical of proposed threat intelligence sharing bill
This fall, the Senate is expected to take another look at the Cybersecurity Information Sharing Act, or CISA, but many security experts and privacy advocates…
Security experts mostly critical of proposed threat intelligence sharing bill
This fall, the Senate is expected to take another look at the Cybersecurity Information Sharing Act, or CISA, but many security experts and privacy advocates…
Report: breached records count down this year
The number of individual records compromised by data breaches has declined by 41 percent during the first half of this year, compared to the same…
EMV transition will still leave security gaps
This October, US merchants and payment providers are scheduled to switch to new, more secure, chip-based payments. But financial transactions aren’t going to become safer…
Ashley Madison still a top lure for scammers and crooks
The Ashley Madison breach has been a Christmas-in-August present for spammers and scammers of all kinds, and your company could be the next target. Here…
Ashley Madison still a top lure for scammers and crooks
The Ashley Madison breach has been a Christmas-in-August present for spammers and scammers of all kinds, and your company could be the next target.Here are…
Court: FTC can take action on corporate data breaches
The US Court of Appeals has ruled that the FTC mandate to protect consumers against fraudulent, deceptive and unfair business practices extends to oversight of…
Court: FTC can take action on corporate data breaches
The US Court of Appeals has ruled that the FTC mandate to protect consumers against fraudulent, deceptive and unfair business practices extends to oversight of…
Study: 81% of large health care organizations breached
In the past two years, 81 percent of hospitals and health insurance companies have had a data breach, according to a report released by KPMG.”These…
Study: 81% of large health care organizations breached
In the past two years, 81 percent of hospitals and health insurance companies have had a data breach, according to a report released by KPMG.”These…