As larger organizations tighten up their information security environment, mid-sized companies around the world have seen a jump in cyber attacks, according to a McAfee survey of 1100 IT administrators.
RSA Europe: Defend against cyberwar by re-architecting networks, not buying more technology, says Richard A. Clarke
Investing money in re-architecting our networks and systems is the most effective way to defend against cyberwar, said Richard A. Clarke, chairman, Good Harbor Consulting, in his keynote today at RSA Europe.
RSA Europe: Suppliers urged to embed security technology in consumer services
Security suppliers can help improve overall internet security by embedding technologies in consumer-facing services, says RSA president Art Coviello.
RSA Europe: Suppliers urged to embed security technology in consumer services
Security suppliers can help improve overall internet security by embedding technologies in consumer-facing services, says RSA president Art Coviello.
RSA Europe: Suppliers urged to embed security technology in consumer services
Security suppliers can help improve overall internet security by embedding technologies in consumer-facing services, says RSA president Art Coviello.
New, harder-to-detect Bugat malware used in LinkedIn attacks
IT security researchers have warned of the emergence of a new, better-hidden version of the Bugat financial malware used to commit online fraud.
New, harder-to-detect Bugat malware used in LinkedIn attacks
IT security researchers have warned of the emergence of a new, better-hidden version of the Bugat financial malware used to commit online fraud.
Stuxnet malware is a paradigm shift in the war to protect critical infrastructure
The Stuxnet malware that has attacked Iranian nuclear facilities and Chinese computers is a “paradigm shift” in the war to protect critical infrastructures around the global, warns the European Network and Information Security Agency (ENISA).
British firms warned over laptop data lethargy
A survey just completed claims to show that around two-thirds (65%) of IT managers have no idea where their organisation’s mobile devices are, and that almost half of respondents are unable to manage PCs and Macs together.
Spammers tap soft hyphens to beat email intercept security
It seems that spammers are starting to use the so-called ‘SHY’ character – aka a soft hyphen – to fool IT security applications into allowing email applications to allow click-throughs to suspect web pages.