|
Doomjuice shows that viruses don't just spread by email | Hits:7 |
A new worm called W32/Doomjuice-A travels via the internet looking to attack computers which are infected with the widespread W32/MyDoom-A worm. Unlike MyDoom, the Doomjuice worm does not travel by email. As part of its infection process... | 2009-08-04 |
Serious security vulnerability found in Microsoft Windows | Hits:3 |
The vulnerability, which Microsoft has described as 'critical' and which affects computers running Windows NT, Windows 2000, Windows XP and Windows Server 2003, could allow a remote hacker to have direct access to a user's computer... | 2009-08-04 |
Symantec software bundled with Intel desktop motherboards | Hits:2 |
Symantec Corp. has announced that it will help safeguard users of Intel desktop motherboards worldwide by providing Internet security checking and access to security protection through the new Intel Desktop Utilities solution. Users will... | 2009-07-31 |
Redstone locks in partners against crime for security launch | Hits:6 |
Redstone Communications has joined forces with leading security specialists to launch a complete portfolio of converged services that provide effective enterprise protection against threats to voice, data, Internet and building security.... | 2009-07-31 |
AT&T intrusion alerting and firewall services help thwart cybersecurity attacks | Hits:3 |
According to Computer Economics in Carlsbad, Calif., the worldwide impact of cyber attacks has grown steadily from 3.3 billion in 1997 to an estimated 12 billion in 2003. As a result, protecting networks against malicious intruders and un... | 2009-07-30 |
SurferQuest protects business centers in hotels | Hits:5 |
Most hotel guests now have access to the Internet to read and write e-mails, surf the Web for the latest news and they can work in Word, Power Point and Excel. Unfortunatly, the computers are often down, and furthermore, there have... | 2009-07-30 |
SmoothWall Introduces Low Cost Alternative to SSL VPN | Hits:218 |
SmoothWall Ltd has announced the availability of version 3.1 of SmoothTunnel, its Virtual Private Network (VPN) Gateway. The new module includes support for Layer 2 Tunnelling Protocol (L2TP). Combined with SmoothWall s L2TP Wizard for... | 2009-07-29 |
Why Perimeter Security Alone is not Enough | Hits:2 |
The focus for many IT Directors over the past few years has been combating the cyber-security threats reported by the media on an almost daily basis. Horror stories of hackers and virus writers have had organisations in a spin, and... | 2009-07-29 |
Employees create business risks by ignoring Internet use policies | Hits:2 |
According to Blue Coat(tm) Systems, employees continue to create security, legal and productivity risks for today's businesses through uncontrolled use of instant messaging (IM) and peer-to-peer (P2P) file sharing in the workplace.... | 2009-07-28 |
Is the UK government computer crime initiative already hamstrung? | Hits:1 |
The UK's efforts to tackle computer crime will be hamstrung by inability to convict even local hackers, NTA Monitor warned following the start of the UK's Computer Misuse Act review to prevent computer crime. Computer crime can't... | 2009-07-28 |
Homefirst chooses Sygate to secure its corporate network | Hits:1 |
Homefirst, the largest Health Social Services community trust in Northern Ireland, has chosen the Sygate Secure Enterprise (SSE) solution to protect all devices attached to its corporate network. The health sector has an obvious... | 2009-07-28 |
Security budgets fail to keep pace with the increasing security threat | Hits:1 |
New research released by Securicor Security highlights a growing disparity between increasing security threats and the money spent by businesses to counteract them. According to the survey, 88 per cent of respondents believe the security... | 2009-07-27 |
Illicit software steals up to one third of charity funds raised online | Hits:2 |
The average infected user has 2-3 spyware programs installed without their knowledge, and the worst case surveyed had 25 illicit programs running on their machine. The software, which is usually installed alongside free... | 2009-07-27 |
205 Bristol businesses hacked in 45 minutes | Hits:1 |
A survey designed to identify as many unsecured wireless IT networks as possible within one hour, has uncovered potentially damaging vulnerabilities in many Bristol companies. The survey, conducted by security experts armed with just a... | 2009-07-25 |
New Microsoft internet vulnerabilities | Hits:1 |
Ubizen's security intelligence lab (SIL) is warning against three new vulnerabilities that have been discovered in the latest fully patched version of Microsoft Internet Explorer (IE). Two of the vulnerabilities mean that users... | 2009-07-25 |
|