Posted on 19 December 2014. | Cybercriminals will use the season to take advantage of businesses as IT staff and end users relax their guard heading into the end of year.
Posted on 18 December 2014. | Cyber criminals of another kind have move in to take advantage of the continuing interest the public has in the movie.
Posted on 16 December 2014. | Here are three harmless behaviors that can compromise your security posture.
Posted on 15 December 2014. | What do organizations need to know to assess their own risk tolerance and implement a balanced, efficient, and effective security strategy?
Posted on 12 December 2014. | The popularity of BYOD has been a boon for improved productivity and collaboration, but it has also created a new set of challenges.
Posted on 19 December 2014. | A new variant of the infamous Zeus banking and information-stealing Trojan has been created to target the users of over 150 different banks and 20 payment systems in 15 countries, including the UK, the US, Russia, Spain and Japan.
Posted on 19 December 2014. | Security researcher Samy Kamkar has devised a fast and easy way to compromise an unlocked computer and open a backdoor on it: a simple and cheap ($20) pre-programmed Teensy microcontroller.
Posted on 17 December 2014. | How to deal with untrustworthy third-party add-ons that could endanger your own users? Prevent them from loading - if you can. That's what Google recently did with Gmail extensions that load code that interferes with the users' Gmail session or malware that can compromise their emailís security.
Posted on 12 December 2014. | Make sure you understand the service level agreements with your cloud service provider. They will often replicate virtual machines in the cloud to ensure availability and make sure they maintain their SLAs. Ask them how they are making sure that your apps and data stay where they belong.