5,000 Malicious Android Apps Identified in Q1, 2012

5,000 Malicious Android Apps Identified in Q1, 2012

Trend Micro released a report to show the most important threats of 2012

Top 10 US Cities for Online Fraud Origination in Q1 2012

Top 10 US Cities for Online Fraud Origination in Q1 2012

New York is ranked number 1 in e-commerce fraud risk

Most UK Organizations Unable to Identify Data Breach Victims in 24 Hours

Most UK Organizations Unable to Identify Data Breach Victims in 24 Hours

Penalties would motivate many firms to focus their efforts on data breach policies

Cybercriminals Dupe Users with Popular Brand Names, Experts Say

Cybercriminals Dupe Users with Popular Brand Names, Experts Say

GFI's VIPRE report shows the most significant events that occurred in March 2012

  • Xbox
  • By Andrei Dobra
  • April 3rd, 2012
Xbox 720 Out in Late 2013, Requires Always-On Internet, Report Says

Xbox 720 Out in Late 2013, Requires Always-On Internet, Report Says

More rumors about the next Xbox have surfaced on the web

Prey 2 Reportedly Canceled, Official Announcement Coming Soon

Prey 2 Reportedly Canceled, Official Announcement Coming Soon

Bethesda has axed the project coming from developer Human Head

Hacktivists Beat Cybercriminals in Data Thefts in 2011, Verizon Says

Hacktivists Beat Cybercriminals in Data Thefts in 2011, Verizon Says

Hacktivists steal entire databases, profit-driven hackers only take what they can use

Data Breaches: Detection Costs Declined, Notification Costs Increased

Data Breaches: Detection Costs Declined, Notification Costs Increased

Companies have learned to put a greater price on the handling of data breaches

Japan and US: Source of Most Cyberattacks Against China

Japan and US: Source of Most Cyberattacks Against China

404 Chinese government sites were attacked in 2011

Up to 5 Million Computers May Be Exposed to RDP Attacks

Up to 5 Million Computers May Be Exposed to RDP Attacks

It's like the Telnet incident from last year multiplied by 200

Hackers, Spambots and Other Non-Humans Make 51% of Site Traffic

Hackers, Spambots and Other Non-Humans Make 51% of Site Traffic

31% of all the traffic on a website can be malicious

Symantec Honey Stick Project: What Happens to a Lost Phone

Symantec Honey Stick Project: What Happens to a Lost Phone

People who find phones try to access private information even if they return the device

Finland Has the Least Malware, Albania the Most

Finland Has the Least Malware, Albania the Most

A study performed by Norman reveals global malware infection rates

Experts: Data Breaches a Result of Employee Behavior

Experts: Data Breaches a Result of Employee Behavior

58% of SMB employees have already clicked on links received via spam emails

NASA: Hackers Targeted Us 5,408 Times in 2010 and 2011

NASA: Hackers Targeted Us 5,408 Times in 2010 and 2011

A report shows that security incidents even reveals the control algorithm for the ISS

The Longest DDOS Attack in H2 of 2011 Lasted 80 Days

The Longest DDOS Attack in H2 of 2011 Lasted 80 Days

Kaspersky analyzed the DDOS attacks launched in the second part of 2011

US Companies Attacked by Competitors, UK Firms by Hacktivists

US Companies Attacked by Competitors, UK Firms by Hacktivists

DDOS attacks against the retail sector may be launched with extortion in mind

 
Want more? Browse: