A new report from the SANS Institute and RSA on help desk security and privacy finds help desk workers are the easiest victims for a determined social engineering criminal. Due to metrics and basic job requirements, end user and network ...
Tags: Computer Products, software
Middle Eastern businesses want to invest in IT during 2013, but they’re struggling to find skilled candidates to fill posts, according to new research released by CompTIA, a non-profit association for the IT industry. According to ...
Tags: Middle East, IT Pros
Fiberlink® today announced that its MaaS360 platform supports the ability to monitor a mobile IT environment and perform actions directly through Google Glass. MaaS360 through Google Glass now delivers unprecedented ways to interact ...
Infraware has announced the release of POLARIS? Office Enterprise Software Development Kit (SDK), equipping developers with a powerful solution to meet the needs of mobile enterprise customers. POLARIS Office Enterprise SDK integrates ...
Tags: Mobile Enterprise, mobile office solution, mobile devices
German state rail operator Deutsche Bahn has filed a lawsuit seeking a reported EUR 750 million in damages against four steel track suppliers that have already been fined by the regulator for fixing prices on track orders. The companies ...
Tags: steel cartel, steel, steel track, steel producer
Phishing attacks are moving from targeting a few key employees in businesses to much wider groups of employees, according to corporate security awareness training company PhishMe. "Once they are in, attackers are using what they learn ...
Tags: Phishing attacks, PhishMe, security awareness, detections systems
Even as IT pros wrestle with the bring-your-own-device (BYOD) trend, corporate security is being further complicated by another emerging trend: bring your own network (BYON). BYON is a by-product of increasingly common technology that ...
Tags: IT, BYOD, corporate security, network, BYON
BitDefender Labs has discovered Android malware that regularly broadcasts the location of the infected mobile device to a remote server. What the malware creators intend to do with the privacy-invading information is not clear. The app ...
Tags: Android malware, infected mobile device, remote server
Half of companies worldwide lack knowledge about potential security threats they may face, a global IT risks survey has revealed. Almost a third of more than 3,000 IT professionals, including 200 from the UK, polled by security firm ...
Unlicensed copies of popular software Keep up to date Patch applications with security updates Conficker still a threat Malicious key generation(keygen)software is one of the fastest-growing types of a malware,according to the latest ...
Tags: top cyber threats, malicious key, malicious keygen software
The night watchman and the IT security guy rarely work together even though their jobs,at the core,are similar:to protect the company.At many organizations,physical and information security remain separate entities by happenstance and by ...
The majority of IT departments might accept employees are using their tablets and smartphones in the workplace, but less than a quarter have policies to control it. This was the finding of new research published by LANDesk today. Of the ...
Tags: tablets, smartphones, software, personal devices
More than two-fifths of companies worldwide have failed to prepare for cyber threats, a survey from security company Kaspersky Lab has revealed. Some 41% of more than 3,300 IT professionals polled in 22 countries – including 200 in ...
Tags: cyber threats, Kaspersky, online attacks
A third of companies admit they have not invested in security for their virtual computing environments, a survey has revealed. This means many businesses are opening themselves up to the possibility of a serious and costly data breach, ...
Tags: security for virtual computing environments, Kaspersky, virtual servers