Cooperation Between CERTs and Law Enforcement Is Crucial, ENISA Says

Cooperation Between CERTs and Law Enforcement Is Crucial, ENISA Says

The agency released a report that contains recommendations on how to address current gaps

Lack of Control over Privileged Accounts Is Often the Cause of Data Breaches

Lack of Control over Privileged Accounts Is Often the Cause of Data Breaches

Quest Software offers insight on how Privileged Account Management practices must be used

Cyberattacks Cause Considerable Economic Damage to Governments, EP Says

Cyberattacks Cause Considerable Economic Damage to Governments, EP Says

Members of the European Parliament believe urgent measures are needed

October 2012 Marked by US Election Spam, Report Reveals

October 2012 Marked by US Election Spam, Report Reveals

The percentage of spam in email traffic dropped by 4.5% compared to the previous month

ENISA Releases Report on the Use of Honeypots to Detect Cyberattacks

ENISA Releases Report on the Use of Honeypots to Detect Cyberattacks

CERTs are not using such resources as much as they should

  • Xbox
  • By Andrei Dobra
  • November 22nd, 2012
Xbox 720 Could Get a Lower Priced Set-Top Box Version

Xbox 720 Could Get a Lower Priced Set-Top Box Version

Microsoft is apparently working on a special, less powerful but lower priced device

UK Users Receive 148 Million Spam SMS Messages Each Month, Study Finds

UK Users Receive 148 Million Spam SMS Messages Each Month, Study Finds

Spammers could be earning as much as £20 million ($31 million) per month

ISF Releases Report to Help Organizations Deal with Security Breach Aftermath

ISF Releases Report to Help Organizations Deal with Security Breach Aftermath

Impact assessment, root cause analysis, and recommendations

Exploitation of Privileged Access Points: Common Vector for High-Profile Attacks

Exploitation of Privileged Access Points: Common Vector for High-Profile Attacks

Cyber-Ark reveals the common element of Subway, Saudi Aramco and Flame attacks

GFI October 2012 Report: Large Number of BlackHole Exploits Identified

GFI October 2012 Report: Large Number of BlackHole Exploits Identified

Users were lured to malicious websites with all sorts of spam messages

Over 10,000 Identity Fraud Rings in the US, Study Finds

Over 10,000 Identity Fraud Rings in the US, Study Finds

ID Analytics’ ID:A Labs reveals that most criminal organizations are composed of friends

Hundreds of People Prosecuted in the UK for Social Media Posts

Hundreds of People Prosecuted in the UK for Social Media Posts

1,286 British users were convicted in 2011 alone

Organizations Worldwide Unable to Meet Privacy and Security Expectations

Organizations Worldwide Unable to Meet Privacy and Security Expectations

A study commissioned by Edelman reveals some interesting figures

31% of UK Mobile Phone Users Mistakenly Believe They Can “Stop” Text Spam

31% of UK Mobile Phone Users Mistakenly Believe They Can “Stop” Text Spam

Cloudmark has commissioned a study to analyze awareness and interaction with spam

65% of Organizations Suffer Three DDOS Attacks a Year, Study Finds

65% of Organizations Suffer Three DDOS Attacks a Year, Study Finds

Radware has released a new report to detail such cyber threats

Symantec Makes Cyber Security Predictions for 2013

Symantec Makes Cyber Security Predictions for 2013

Ransomware will replace scareware and cloud services will become more tempting targets

Ransomware Helps Crooks Extort over $5 Million (€3.9 Million) per Year from Victims

Ransomware Helps Crooks Extort over $5 Million (€3.9 Million) per Year from Victims

Symantec has released a white paper that focuses on this threat

 
Want more? Browse: