Security

The number of security holes in software this year has decreased

The number of publicly disclosed vulnerabilities in 2011 decreased, as well as the proportion of bugs that were exploited. Affects the development of a safe? Attacking this year reached a great success, but a common attack vector – the exploitation of vulnerabilities in software – it seems on the decline. According to preliminary data companies that collect information about the vulnerabilities,…

Continue Reading

General

People prefer to lie in writing

According to the latest research, it is more convenient for people to lie through text messages than with other forms of communication such as video chat, and face to face communication. A new study by Sauder School of Business, University of British Columbia, found that people feel more comfortable if they lie in the text, and the people who told…

Continue Reading

General

10 most important Open Source projects in 2011

That came to an end for another year. It’s time to step back and evaluate everything that has happened during this period. It turns out that in 2011 became a model in terms of support for open source projects. So select 10 projects have been quite difficult. But what is meant by the word “important”? Obviously, this is not only those projects that are…

Continue Reading

Security

IT professionals cannot deny themselves the pleasure to delve into confidential information

Workers who provide IT security will be the most knowledgeable people on New Year corporate parties this year. Exactly 26% of them admitted that they use their positions to verify confidential information to which they generally should not have access. A recent study by Lieberman Software, associated with passwords, found that IT staff can not resist the pleasure of digging into…

Continue Reading

Security

Trends in network security for financial enterprises in 2012

Company Booz Allen Hamilton called the growth of cyber threats to senior executives, the influence of organized crime and the security of mobile devices among the ten most important trends in cyber security that will make 2012 a pivotal year for banks and investment firms, since they tend to be in the forefront when it comes to security. These threats…

Continue Reading

Security

40% of the organizations questioned the safety processes of recycling of old PCs

As it turned out in a recent study of Osirium, British organizations are not sure that all data and settings are removed from the device prior to disposal. Corporate devices store different versions of sensitive data and credentials, access, all of which can be removed if desired. Hackers can not only get access to the network using the obtained administrator privileges,…

Continue Reading

Gadgets

12 most vulnerable smartphones

Bit9 has provided a list of the most vulnerable smartphones to date. Caught in a “black list” of devices carry the most serious threat to the safety and security of personal data of users and corporations. According to the report, phones based on Android occupy the entire list. The first place is Samsung Galaxy Mini, the second and third places went to…

Continue Reading

Security

Data Leakage – the main security threat

Consulting firm for information security Pure Hacking said that Australian organizations underestimate the risks of leaks that occur when connecting their employees personal devices to corporate networks. “Corporate data leakage from internal sources – is the main factor affecting today’s Australian organizations”, – said Ty Miller, CTO of Pure Hacking. “This is because IT departments and management underestimate the difficulties that…

Continue Reading

Security

The most popular activities prohibited for administrator

Despite the fact that 74% of IT professionals already abuse company systems, and could lose their jobs if the video recording proved their violations, 92% of respondents would not mind if they are watched over by monitoring tools. The reason is that almost half of them have to share user names and passwords for server administration tasks, and 41% of…

Continue Reading