Wikileaks file dump contains malware: Report

Whether you side with Wikileaks or not in its mission to spill secrets, here’s some advice most people can get behind: If you’re going to release documents for public consumption, maybe check them for viruses first.

Why do security warnings go unheeded? Users’ brains

If you think your users are terrible at noticing security issues, you may be right. But before you go blaming them, just know this: Most warnings go unheeded not because users aren’t paying attention, but because they’re focusing on something else – doing their jobs.

Ransomware-as-a-Service takes skill out of cyberattacks

It no longer takes the best and brightest hackers to bring down a company. In fact, these days almost anyone motivated enough can do it.

Data loss is on the rise, and users are the biggest culprit

An increase in lost and stolen company data is a scary situation. Even more frightening: The problem often lies with users, not cybercriminals.

IT skills shortage hurts security: Report

There’s a shortage of IT pros, in case you haven’t heard. And that shortage is especially bad for cybersecurity pros. Here’s what it means for you.

The C-level thinks disaster recovery is solid: IT says …

Disconnect with higher-ups is never a good thing. And according to a recent study, the miscommunication between IT and company leaders is stark and dangerous.

5-year-old malware discovered: Why it took so long

Many surveys ask IT pros whether they’ve been breached in the past month, year, etc. But that question overlooks a common problem: Many companies that are breached don’t know it yet – and some conceivably never will. Case in point: Researchers recently uncovered a malware strain that’s been active since at least 2011. This highly […]

Cybercrime is now more prevalent than traditional crime

In news that’ll come as a relief to those outside of IT and disappointment to IT pros, traditional crime now lags behind cybercrime in at least one country.

Hackers are coming for your privileged accounts: What you can do to stop them

Not all accounts are created equal. Those that have special privileges and access are a prime target for hackers, and companies know it. But what can they do to protect these super users?

3 infographics that perfectly sum up why women are needed in IT leadership

There has long been a gender gap in IT-related fields. But just where does this shortage of women in the Science, Technology, Engineering and Math (STEM) field come from? And what can be done to reverse the trend?