Sentinel Labs researchers say the malware is so hard to detect it's 'virtually invisible.'
That's happening even though 65 percent say it's their responsibility to protect that data.
73 percent of respondents to a recent survey said they're very or extremely concerned about the impact of ransomware, up from 48 percent in January.
Forty-five percent of IT staff say they monitor network and application performance manually instead of using network monitoring tools.
The malware is currently being offered for sale online for $7,000 -- or $1,000 for a one-week trial.
Researchers at UC Berkeley alerted the company to the flaws, and also found vulnerabilities in three competing solutions.
The malware, which was first uncovered in 2011, has infected more than 30,000 Windows PCs worldwide.
Still, only 28 percent say security is one of their organization's top five strategic priorities.
A brokerage firm, a health district, a retirement community, a hospital and an oil change franchisee were all recently hit.
Site owner HotelStayUK says the security flaws were 'obviously completely unacceptable.'
'The future will be hybrid,' says Gartner research vice president Carsten Casper.
'Email encryption is the best tool to stop mass surveillance on the Internet,' says company co-founder Matthias Pfau.
Just 16 percent of IT and IT security professionals know the location of all of their sensitive structured data.
Symantec researchers say the campaign 'bears the hallmarks of a state-sponsored operation.'
Names, birthdates, Social Security numbers and bank account information may have been accessed.
A photo published in a Brazilian newspaper clearly showed the network's SSID and password.
Forty-six percent of senior IT pros say data is leaking from their companies due to the use of file sharing services.
While 63 percent think it's easy to govern access rights, 42 percent admit they aren't able to monitor or prevent insider breaches.
Columbia University's Jason Nieh and Nicolas Viennot found thousands of secret keys being stored in app software.
While the attack exposed some flaws in the app, Yo has exploded in popularity since the breach.
A hacker deleted most of the company's data, backups, machine configurations and offsite backups.
The malware, also called Dyreza, is designed to bypass SSL and steal login credentials.
Names, Social Security numbers and birthdates were exposed, along with a variety of other information.
The hackers claim to have stolen more than half a million customers' names, addresses, phone numbers, email addresses and passwords.
An undisclosed number of customers' Social Security numbers and birthdates were accessed.
- Jun 2014
- May 2014
- Apr 2014
- Mar 2014
- Feb 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Jul 2013
- Jun 2013
- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Nov 2011
- Aug 2011
- Jun 2011
- Mar 2011
- Dec 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Apr 2006
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?