Bad guys are using online advertising networks and popular sites like YouTube to serve malware to unsuspecting Internet users, finds new research from Bromium Networks.
As the software-defined data center becomes more common, enterprises are seeking security solutions that are abstracted from the underlying infrastructure.
With connected cars becoming more common, experts say vehicle manufacturers should adopt security best practices used by mobile device makers.
Hackers targeted Microsoft's Internet Explorer with an emerging attack technique called action script spray in the first half of 2014, say Bromium Labs researchers.
Train users to read and heed mobile application permissions, says McAfee Labs.
Israeli startup FortyCloud recently opened a U.S. office to grow its business, which focuses on helping companies secure data in the public cloud.
Retail Cyber Intelligence Sharing Center initiative will make it easy for retailers to share cybersecurity intelligence with each other and with government agencies.
Most IT professionals are stressed out at work, a recent survey suggests. Information security pros are especially stressed, thanks to growing levels of unpredictability.
Most mobile security solutions utilize a traditional endpoint management approach, but not the cloud security service provided by startup Armor5.
Bitglass found that few companies use single sign-on, which the security vendor calls ""the most basic security measure for SaaS adoption."
Alert Logic's annual State of Cloud Security report shows a larger variety of attacks in the cloud, demonstrating the need for more comprehensive approaches to cloud security.
Enterprises with IT security staffs should find it easy to implement the patch for the Heartbleed vulnerability. But small companies may struggle to protect their websites and customers, experts say.
While two reports find that infosec pay is among the best in IT, infosec pros also face some of the greatest on-the-job challenges.
Just 16 percent of adults who use mobile devices for work wipe data from old devices when they get a new one. It's important to educate employees about the BYOD risks this creates.
While few e-commerce sites fail to protect sensitive data with the HTTPS protocol, many sites continue to use the less secure HTTP for some functions.
Despite the risks of not making security policies central to enterprise BYOD and mobility programs, many organizations are ignoring this best practice.
Hackers collectively known as Anonymous plan to participate in a protest called the Million Mask March. Do organizations need to revisit their security strategies?
The annual Building Security in Maturity Model (BSIMM) study adds new software security data every year. Nearly 70 companies contributed to version five, introduced this week.
Want employees to pay attention to security awareness training? Make it accessible, pervasive and targeted to your audience.
Despite security concerns, a surprisingly small number of companies blacklist or whitelist applications on mobile devices.
Some mobile Android apps from Fortune 500 companies do not adhere to security best practices, finds a recent analysis by IT consulting firm RIIS.
Just as lions look for gazelles with their defenses down at waterholes, hackers are spreading malware through websites popular with specific groups of users.
Perhaps the biggest mobile device management (MDM) trend to watch is its evolution to a more holistic approach some experts call enterprise mobility management.
Malware that uses a pop-up window to hijack a user's machine and asks them to take a survey could lead to more serious demands, says Malwarebytes' lead analyst.
Thanks to the BYOD phenomenon, Gartner expects 65 percent of enterprises to adopt a mobile device management (MDM) solution over the next five years.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?