A new survey from Ernst & Young discovered that 96% of the 1,909 executives questioned felt that their companies were unprepared for a cyber attack, but only 23% of the companies placed security awareness in their top two priorities.
Researchers have concluded that 73% of the 40,000 most popular websites that use WordPress software are vulnerable to attack. But they admit they might be wrong. Even so, they still highlight an important security issue which isn't diminished one iota by their sketchiness.
Half of Americans approve of their government's collection of telephone and internet data as part of anti-terrorism efforts even though they believe PRISM goes further than they have been told.
Malware targeting point-of-sale (POS) systems has been a major trend for the last six months. With easy pickings to be had from mom-and-pop shops, this pattern is only going to grow until people start fighting back with better system security, and ideally better payment card systems.
Virus Bulletin's Technical Director John Hawes takes a look....
A new technical paper from SophosLabs explores the history and technology of ransomware. From payment by SMS to public key encryption, ransomware has certainly evolved.
Within 3 hours of downloading, the copyright enforcers likely have your IP address, according to researchers who put a fake pirate server online and then sat back to see who came sniffing around.
I have left phones in airplanes, in cabs, at friends' houses, etc...it is embarrassing really. But it turns out I'm not the only one.
ENISA conducted some research to examine the economic dimension of privacy. Put simply: would you pay a bit extra for additional privacy?
Think a passphrase of multiple, random dictionary words is as unguessable as long strings of gibberish, but easier to remember? Not necessarily, according to a recent study.
Research presented at the Hacker Halted conference in Miami late last month showed how hackers could take control of industrial control systems used in prisons.
July and August often produce some intriguing and unusual computer security research.
We've already written about BlackHat and DEFCON. Here's something from the USENIX HotSec workshop to pique your interest.
Many of you are all too aware of the number of patches repairing flaws in Adobe's Reader and Acrobat software in the last couple of years. Their PDF reader is deployed on nearly all computers, which is too juicy of Read more…
Scammers use decoy documents (fake invoices, bogus airline tickets, imaginary lottery wins, political commentary on Tibet, information about World Cup 2010 fixtures, and so forth) to trick us into opening files which are dangerous. SophosLabs is pioneering techniques to use Read more…