Which emails are most likely to be phishing?

When it comes to phishing attempts, anyone can be a target. The question is: How will the attackers try to fool users? 

Worldwide cloud outages have users worried

Microsoft and Google took a little break from fighting over patches to have a shared moment of humility. Within the span of a few months, the two mega companies experienced prolonged worldwide cloud outages. 

Malware could already be on devices when you buy them

Some people take great pleasure out of opening the box on a new phone, tablet or PC. For others, it’s just the start of their problems. 

Multiple banks slammed by hackers: Key lessons learned

When Kaspersky unveiled a major cyberattack that hit several banks for almost a billion dollars, there were several parts of the announcement that intrigued cybersecurity experts and businesses in general. 

Soft skills are hard to find

IT pros are in high-demand, and while some skills such as Big Data analytics and application programming are topping many companies’ wish lists, it turns out the hardest thing to find could be techs with the soft skills necessary to succeed. 

Google backs off – just a little – on Project Zero

The controversial Project Zero made Google a lot of enemies, from software giants to companies and individual users caught in the middle. Now Google is deciding to take it a little easier on its critics. 

Looking for good tech talent? Yeah. So is everyone else

It’s not getting any easier to find and retain good techs. Here’s what the competition is up to – and how you can help keep your staff happy and in-house. 

Researcher releases 10 million passwords and usernames

Surprisingly, all things told, a recent dump of more than 10 million passwords and usernames may not actually be that big of a security risk. In fact, it could boost password security on the whole. 

Security advice: Shut up and watch TV

Hard to believe that this isn’t something out of a dystopian novel: Samsung is warning some its customers not to discuss anything private while watching television. 

1st step for security software: Take it out of the box

A recent study by Osterman Research Inc. finds many companies have an interesting approach to security software: They’re buying it, and never actually using it.