Analysis: security weak spots

Reading the coverage of the recent breach of Adobe passwords, we learned that 1.9 million users used “123456” as their password. That’s right: out of 38 million cracked passwords, almost two million adults used ones more suited to five-year-olds.

The Way Forward

When it comes to security, it seems everyone’s in a state of perpetual panic. Whether it’s mobile malware, BYOD or hacktivism, over the course of 2013 the issue of protecting valuable information and resisting attack has inspired a dizzying and persistent challenge.

Insight: top signs that you’ve been breached

Because data is often the most valuable corporate asset – especially when customer information is concerned – staying alert for potential compromise is a critical IT job. Unfortunately, looking into a potential data breach is not easy.

The worse for malware

Through the advent of mobility, smartphones and tablets are now more dangerous devices to enterprises than laptops and PCs.
Mobile malware continues to proliferate, and at the same time employees are insisting on bringing their personal devices to work.

Big Data: big threat?

“Collecting more and more unstructured data will open up another whole degree of attractiveness and may well lead to attackers seeing value in a form not previously recognised by the organisation that owns the data.”

Report: NSA has little success cracking Tor

The US National Security Agency has repeatedly tried to compromise Tor, the government-funded online anonymity tool, but has had little success, according to a new report in the UK’s Guardian.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines