What leads to unhappy IT pros? Survey has the answer

Keeping your staff happy may seem like a full-time job in and of itself. But it’s an important part of the job: When IT pros burn out, the fallout can cause serious headaches. 

While IT sweats BYOD policies, users reject them

Two recent reports show that neither users nor IT are particularly comfortable with BYOD as it stands today. And while IT is working to refine these policies, users are likely to ignore them. 

Mobile malware infects users, then goes after contacts

A revamped version of recently discovered mobile malware pulls out all the stops: It uses multiple methods of attack, spreads rapidly to users’ contact lists via text messages and disguises itself well. Here’s what to watch out for. 

What JPMorgan says about cybersecurity shortcomings

Another day, another major data breach. This time, it’s JPMorgan’s turn in the spotlight, as the private information of 76 million households and 7 million small businesses was exposed in a relatively simple phishing attack. 

‘Malvertisements’ hitting the big time

It used to be that the only dangerous ads were the ones delivered to your email inbox. But now attackers are finding ways to sneak malicious ads – or ‘malvertisements’ – onto even legitimate websites. 

App developers earn a ‘D’ in security

Whether you build apps in-house or purchase from outside, you’re going to want to see the results of a recent study by Aspect Security. 

With cloud apps, confusion abounds

IT has its hands full managing cloud apps, according to a recent survey – especially because there could be a major disconnect between IT’s knowledge of apps in the organization and reality. 

eBay sellers attempt to steal log-ins: What to tell your users

Cross-site scripting attacks, one of the most common tactics for hacking accounts, were recently found on eBay, one of the largest online retailers out there. Here’s how to keep your users safe – no matter which sites they’re on. 

Outsourcing leads to 18-month-long data breach

Using outside vendors to help manage systems is a way of life for many companies. But a recent data breach shows this practice could put companies and their customers at serious risk. 

Even rocket scientists can’t patch correctly

A recent report revealed several serious vulnerabilities in a government satellite system. How these vulnerabilities were racked up shows some very common mistakes companies make with their security.