Security vendor McAfee's research arm, McAfee Labs, has identified growth across four threat trends, including Android-based malware, signed malware, spam, and virtual currencies.
As growth slows and vendors make less money on each sale, mobile operators will need to identify other services and perks to make money, according to researchers at Ovum.
Worldwide IT spending will peak at $3.8 trillion in 2014, marking the beginning of the Digital Industrial Economy era, according to Gartner.
While the energy industry may fear the appearance of another Stuxnet on the systems they use to keep oil and gas flowing and the electric grid powered, an equally devastating attack could come from a much more mundane source: phishing.
Hackers are exploiting the lack of security basics among social media, mobile devices and even in business, reports an IBM X-Force analysis
A malicious app is apparently being used to distribute mobile spyware on the popular via the free classifieds site.
The end of Microsoft's support for popular suite come April 2014 will usher in an era of 'infinite zero-day' attacks, analyst predicts
With IT not requiring safer pass codes and device usability a factor, finding of 80 percent of users choosing convenience not surprising
Hackers are increasingly turning to brute force attacks aimed at snaring credentials.
The Samsung Ativ Book 7 has a high-resolution touchscreen display and fabulous battery life, but its keyboard will drive touch-typists bonkers.
One in seven emails from financial brands poses risks to consumers, a study suggests.
Distributed Denial of Service (DDoS) attacks are getting bigger, but their duration are getting shorter, according to an analysis released last week by Arbor Networks.
'Over-the-top' services are used to disguise text spam campaigns by sending a few messages from many phone numbers.
Distributed Spam Distraction attacks may last up to 24 hours, and inundate an inbox with as many as 60,000 messages, AppRiver report notes in a report.
Articles by JrNext Page