While companies scramble to protect their systems against hackers, one target is increasingly becoming a popular means of stealing money: the humble land line.
Keeping your staff happy may seem like a full-time job in and of itself. But it’s an important part of the job: When IT pros burn out, the fallout can cause serious headaches.
Two recent reports show that neither users nor IT are particularly comfortable with BYOD as it stands today. And while IT is working to refine these policies, users are likely to ignore them.
A revamped version of recently discovered mobile malware pulls out all the stops: It uses multiple methods of attack, spreads rapidly to users’ contact lists via text messages and disguises itself well. Here’s what to watch out for.
Another day, another major data breach. This time, it’s JPMorgan’s turn in the spotlight, as the private information of 76 million households and 7 million small businesses was exposed in a relatively simple phishing attack.
It used to be that the only dangerous ads were the ones delivered to your email inbox. But now attackers are finding ways to sneak malicious ads – or ‘malvertisements’ – onto even legitimate websites.
Whether you build apps in-house or purchase from outside, you’re going to want to see the results of a recent study by Aspect Security.
IT has its hands full managing cloud apps, according to a recent survey – especially because there could be a major disconnect between IT’s knowledge of apps in the organization and reality.
Cross-site scripting attacks, one of the most common tactics for hacking accounts, were recently found on eBay, one of the largest online retailers out there. Here’s how to keep your users safe – no matter which sites they’re on.
Using outside vendors to help manage systems is a way of life for many companies. But a recent data breach shows this practice could put companies and their customers at serious risk.