The number of security holes in software this year has decreased

The number of publicly disclosed vulnerabilities in 2011 decreased, as well as the proportion of bugs that were exploited. Affects the development of a safe? Attacking this year reached a great success, but a common attack vector – the exploitation of vulnerabilities in software – it seems on the decline. According to preliminary data companies that(…)

People prefer to lie in writing

According to the latest research, it is more convenient for people to lie through text messages than with other forms of communication such as video chat, and face to face communication. A new study by Sauder School of Business, University of British Columbia, found that people feel more comfortable if they lie in the text,(…)

10 most important Open Source projects in 2011

That came to an end for another year. It’s time to step back and evaluate everything that has happened during this period. It turns out that in 2011 became a model in terms of support for open source projects. So select 10 projects have been quite difficult. But what is meant by the word “important”? Obviously, this is not(…)

British companies still ill-prepared for downtime and unexpected outages

British companies still ill-prepared for downtime and unexpected outages, said in ControlCircle. A recent survey of 100 presidents / chief operating officer / Heads of IT departments showed that although 90% have a strategy, only 46% checked and tested their business continuity procedures in the past 12 months. In 42%, or no strategy, or they are(…)

IT professionals cannot deny themselves the pleasure to delve into confidential information

Workers who provide IT security will be the most knowledgeable people on New Year corporate parties this year. Exactly 26% of them admitted that they use their positions to verify confidential information to which they generally should not have access. A recent study by Lieberman Software, associated with passwords, found that IT staff can not resist(…)

Trends in network security for financial enterprises in 2012

Company Booz Allen Hamilton called the growth of cyber threats to senior executives, the influence of organized crime and the security of mobile devices among the ten most important trends in cyber security that will make 2012 a pivotal year for banks and investment firms, since they tend to be in the forefront when it(…)

40% of the organizations questioned the safety processes of recycling of old PCs

As it turned out in a recent study of Osirium, British organizations are not sure that all data and settings are removed from the device prior to disposal. Corporate devices store different versions of sensitive data and credentials, access, all of which can be removed if desired. Hackers can not only get access to the network(…)

12 most vulnerable smartphones

Bit9 has provided a list of the most vulnerable smartphones to date. Caught in a “black list” of devices carry the most serious threat to the safety and security of personal data of users and corporations. According to the report, phones based on Android occupy the entire list. The first place is Samsung Galaxy Mini, the second(…)

Data Leakage – the main security threat

Consulting firm for information security Pure Hacking said that Australian organizations underestimate the risks of leaks that occur when connecting their employees personal devices to corporate networks. “Corporate data leakage from internal sources – is the main factor affecting today’s Australian organizations”, – said Ty Miller, CTO of Pure Hacking. “This is because IT departments and(…)

The most popular activities prohibited for administrator

Despite the fact that 74% of IT professionals already abuse company systems, and could lose their jobs if the video recording proved their violations, 92% of respondents would not mind if they are watched over by monitoring tools. The reason is that almost half of them have to share user names and passwords for server(…)