The first half of the 2011 was marred by a spate of data breaches, vulnerability exploit attacks, the proliferation of more and more Android malware, improved social networking scams, and notable developments in traditional system infections. As our security experts predicted, enterprises suffered from a slew of data breaches of never-before-seen magnitude. This spelled disaster […]
Latest Comments