Tag Archive for: often

Data Breaches Often Come From Where You Expect It Least – Inc.com


Inc.com

Data Breaches Often Come From Where You Expect It Least
Inc.com
Data breaches are in the news a lot these days. It seems that you can't turn around without hearing about a new one, and they seem to keep getting worse and more far-reaching. Consumers are concerned about data breaches, and many can be reluctant to …

data breach – Google News

Malware infection rate of smartphones is soaring – Android devices often the target

Smartphones are by far the most popular target of mobile malware, and the infection rate is soaring, according to new research by Nokia.

During the second half of 2016, the increase in smartphone infections was 83% following on the heels of a 96% increase during the first half of the year, according to Nokia’s latest Mobile Threat Intelligence Report gathered from devices on which Nokia NetGuard Endpoint Security is deployed in Europe, North America, Asia Pacific and the Middle East.

To read this article in full or to leave a comment, please click here

Network World Security

Vulnerabilities on the decline, but risk assessment is often flawed, study says says

Based on data gathered over the first six months of 2014, security researchers from IBM X-Force predict that the number of publicly reported vulnerabilities will drop to under 8,000 this year, a first since 2011.

While the majority of flaws disclosed so far fall into the medium-risk category, the IBM researchers said that the widely used system to rate their severity often fails to reflect the real risk they pose to users.

Over the first half of the year, the IBM X-Force team collected reports about 3,900 security vulnerabilities from advisories published by software vendors, security industry mailing lists and other sources. If vulnerability disclosures continue at the same rate, the number of flaws reported in 2014 will fall under 8,000, several hundred less than in each of the previous two years, the team said in a report released this week.

To read this article in full or to leave a comment, please click here

Network World Security