Corporate Partners

Data Protection — News

SpyEye Trojan Targets Online Banking Security Systems

Researchers have discovered a new attack by a popular malware program, the <a href="http://www.pcworld.com/businesscenter/article/236562/spyeye_trojan_morphs_to_defeat_online_banking_defenses.html">SpyEye Trojan</a>, that is aimed at cracking security schemes that use text messaging to send confirmation codes to consumers so they can confirm transactions from their accounts.

John P. Mello Jr. | 07 Oct | Read more

IT Audit Survey Exposes Weak Risk Assessment

Even in the face of costly and embarrassing corporate security breaches, one in four companies fails to conduct any IT risk assessment. And 42% say there are areas of their information technology audit plans that cannot be addressed because of a lack of resources and expertise.

Roy Harris | 06 Oct | Read more

Laptops walking out the door of policy-free firms

Concerned that your employees are being a bit lax when it comes to looking after their laptops? Steal them yourself, one vendor has advised in the wake of yet another damning security report that suggests laptops and other equipment are literally walking out of Australian companies that are still operating at far below world's best practice when it comes to device security.

David Braue | 06 Oct | Read more

Can we ever close the USB security gap?

When something as seemingly esoteric as USB security can hit a mainstream cartoon like Dilbert, you know it’s a real issue. But it’s also one that has been poorly addressed by many companies, whose employees seem to be losing data through this largely unpoliced security hole faster than your Uncle Barry going through $2 coins at the local TAB.

David Braue | 05 Oct | Read more

Mobile security threats are heating up

According to industry analysts, mobile device shipments will exceed a billion devices in 2015 and will rapidly outrun PC shipments. That's great news for end user convenience, mobility, and work-anywhere productivity. But it also means that enterprises must brace for the fact that the <a href="http://www.csoonline.com/article/690905/iphone-and-ipad-security-the-human-element">bad guys will target these devices</a> with attack exploits, spyware, and rogue applications.

George V. Hulme | 06 Oct | Read more

Slideshow: The Future of Malware

It seems like there's a new data breach every day. And, the experts say, it's only going to get worse as hackers come up with new ways of getting their hands on our personal information. Here's a look at how malware is expected to evolve.

Jeff Vance | 05 Oct | Read more

10 security essentials for the networked enterprise

The ideal information security environment is different depending on who you talk to. Your typical security engineer may say it must have firewalls, intrusion detection or any number of security focused technologies. Meanwhile a security tester may suggest that it is conducting penetration testing to provide assurances that security widgets are working well.

Simon Burson | 05 Oct | Read more

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place