Much of today's crime is "cyber-enabled," warns cybercrime expert Raj Samani, and successfully blocking such attacks increasingly demands not just better technology and public-private collaboration, but also an understanding of psychology.
The adoption of so-called "bring your own device" (BYOD) programs has raised new tensions between IT departments and workers over employer access to personally owned mobile devices. BYOD programs have opened the gates to a range of consumer devices in the workplace, raising concerns over data security and nonstandard...
Community banking institutions are at great risk of cyber-attack because they often don't think they're targeted, says Scott McGillivray of Pacific Continental Bank, who describes how to convey this risk to senior management.
More hackers are holding data for ransom, demanding everything from bitcoins to the shutdown of nuclear reactors, under the threat of leaking sensitive information. But it's not clear how many such attacks generate revenue for attackers.
Today's cyber world is an evolving landscape of known vulnerabilities and exploits coupled with new threats brought by new technologies. Security professionals must learn to protect their businesses from both.
The HP Cyber Risk Report 2015 brings the information you need to do that. This comprehensive study...
A tiny Illinois hospital was the target of an extortion scheme in which an anonymous e-mailer threatened to make public patients' information. The incident shows why providers of all sizes need to be prepared to deal with emerging threats.
For virtualization security, there's no one size fits all solution...and trying to fit your organization's specific needs into the wrong security product can be a costly mistake. Do you know how to pick the right option for your organization?
A new whitepaper from Kaspersky Lab, Virtualization Security Options:...
All organizations with an on-line presence need to quickly and efficiently detect hackers and fraudsters. However, to avoid frustrating the very people you want to feel welcome, it's critical that authentication processes be as simple as possible.
The newest generation of authentication technology utilizes shared...
Except for the leak of celebrities' private data, the "wiper" malware attack against Sony Pictures Entertainment shares "extraordinary" similarities with previous wiper attacks in Saudi Arabia and South Korea, a security researcher finds.
Damballa's Q3 State of Infections report discusses the state of continuous breach that enterprises face today.
Key findings in this report include:
Malware dwell time equates to loss;
How to minimize risk of a POS malware breach;
Where the security gaps are and how to close them.
Security vendor Proofpoint warns that a "malvertising" campaign has been launching ransomware attacks against users of numerous high-profile websites, including search site Yahoo, dating site Match.com, and an AOL real estate site.
Hacking a car remotely might have seemed like science fiction a few years ago. But as cars are added to the "Internet of Things," the industry is ramping up its efforts to address ever-evolving, and realistic, security issues.