|
Microsoft issues critical security patch against Bofra bug | Hits:5 |
Companies and home users are urged to ensure they are protected against a security hole found in Microsoft Internet Explorer, which has already been exploited by an internet worm. The vulnerability - known various as the Internet... | 07/16/2009 |
Check Point Secures Communications for City and Hackney Teaching Primary Care Trust | Hits:4 |
Check Point Software Technologies Ltd. has announced that City and Hackney Teaching Primary Care Trust (City and Hackney TPCT) has standardised on Check Point's intelligent VPN-1 Pro(tm) solution to secure its communications infrastructure... | 07/16/2009 |
One in every ten emails infected by Christmas card virus | Hits:4 |
The Zafi-D worm (W32/Zafi-D), which was discovered on Tuesday posing as a Christmas greeting, has continued to cause problems for unprotected computer users. The virus is currently accounting for 72% of all virus reports in the last 24... | 07/15/2009 |
Aladdin Announces General Availability of eToken Simple Sign-On (SSO) | Hits:8 |
With the growing number of applications and electronic resources used in organisations, passwords often create significant costs and security issues for those organisations. Users managing multiple passwords typically write them down... | 07/15/2009 |
Security threat emerges as thousands of mobile devices left in taxis | Hits:7 |
Businesses and individuals are being urged to use the password and encryption facilities available on the recent crop of high memory capacity mobile smartphones, in order to protect the sensitive information held on them. This advice comes... | 07/14/2009 |
Trojan steals usernames and passwords for fantasy role-playing game | Hits:7 |
A new Trojan horse, LegMir-Y, is designed to steal usernames and passwords from players of a massive multi-player online role-playing game, Lineage . Lineage is a medieval themed fantasy game played over the internet and claims to have... | 07/14/2009 |
Email virus pulls a funny face | Hits:5 |
A new worm demonstrates the ancient British art of gurning, the tradition of pulling a funny or scary face, as it infects computers with a backdoor Trojan. The Wurmark-F worm spreads via email, pretending to be from addresses such as... | 07/13/2009 |
90% of remote access VPN systems have exploitable vulnerabilities | Hits:7 |
Over a three-year period of testing VPNs, NTA Monitor has discovered that 90% of remote access VPN systems have exploitable vulnerabilities. The tests were mainly carried out for large organisations, including financial institutions that... | 07/13/2009 |
Pointsec partners with i-mate to offer secure mobile devices | Hits:10 |
Protecting mobile devices from hackers, theft or loss due to sheer forgetfulness, and the potential security breach that comes with jeopardized data, is a very real threat that plagues the mobile industry. i-mate have launched a security... | 07/11/2009 |
CipherTrust introduces new IronMail models for small and medium enterprises | Hits:15 |
CipherTrust has announced that the IronMail appliance is available for companies with 1,000 employees or less. Available in four models, the IronMail S-class offers the same industry-leading technology as the enterprise-class... | 07/11/2009 |
American Megatrends and Ancora Technologies Announce Strategic Alliance to Offer BIOS Based Security | Hits:11 |
The recent phishing attacks on online banking accounts highlight the need for an effective yet convenient 2nd factor authentication in addition to a password. Ancora Online provides consumer strong authentication that enables consumers... | 07/10/2009 |
Locks only keep the honest people out | Hits:7 |
It's a maxim that applies as much to network security as it does to protecting physical assets because there are many ways for a determined individual to penetrate a perimeter defense. Some threats like the Sobig virus instantly threatened... | 07/10/2009 |
Open Source For Perimeter Security: Two Projects Provide Answers | Hits:6 |
There is a widespread and wholly inaccurate impression that open source development is somehow haphazard and undisciplined, a free-for-all among brilliant but uncoordinated individuals. In fact, most major open source projects are very... | 07/09/2009 |
Enterasys Secure Networks Helps Hyundai UK Manage IT Challenges | Hits:9 |
Enterasys Networks (NYSE: ETS) has announced that Hyundai Cars in the UK has deployed Secure Networks(tm) solutions to provide a secure, scaleable, resilient infrastructure for its UK headquarters. The Korean automotive manufacturer also... | 07/09/2009 |
Telecom Fraud: The Cost of Doing Nothing Just Went Up | Hits:8 |
In today's business environment, IT network security is vitally important, with security breaches across voice and data networks growing by the day. Emotive terms such as cyber attack and cyber-terrorism are always certain to... | 07/08/2009 |
|