Your are here:hacking technology > the virus to be related > Article list

Children have little understanding of Internet securityHits:2
According to research by Global Secure Systems (GSS), pupils are using their PCs at home for two main reasons: online chatting and downloading and sharing music. However, 40 percent admit that they have chat buddies who they do not know in...2009-06-11
Romanian hacker started phishing campaign when he was 14 years oldHits:1
The US District Court in Minneapolis has sentenced a 23-year-old Romanian immigrant to 8.5 years in jail for stealing a total of approximately 700,000 from over 7,000 innocent people. Sergiu Daniel Popa spammed out emails pretending to com...2009-06-11
Security Trends Predictions for 2007Hits:3
IBM X-Force has announced several predictions for the top security trends of 2007. Among the host of threats on the security horizon for 2007, X-Force foresees broader and more targeted identity theft attacks on consumers as well as an...2009-06-10
Vulnerabilities prevent PC users trying to use Internet search engines to locate information about pHits:3
Search engine companies should find better and faster ways to help security vendors expose new infections and make protection readily available to computer users. Prevx has uncovered new vulnerabilities affecting PC users trying to use...2009-06-10
Tumbleweed adopts Fortify Source Code Analysis as its software security solutionHits:3
Fortify Software Inc. hasannounced that Tumbleweed Communications Corp. has adopted Fortify Source Code Analysis (SCA) as its software security solution. Tumbleweed's approach to securing online communications allows organisations to...2009-06-09
Dramatic increase in spam puts business email users under significant strainHits:2
Spam levels have historically risen month on month - but since July 2006 the trend has considerably worsened, with spammers significantly changing tactics which has resulted in the start of a sudden, exponential rise in volumes of traffic....2009-06-09
The most common hacker is probably sitting in the cubicle next to youHits:4
I m often asked: what s the most common type of hacker and attack? Over time I ve discovered that the general public holds a somewhat romantic image of hackers. One mental picture involves an emaciated young man in a poverty-stricken...2009-06-08
Security anti-predictions for 2007Hits:4
It s the New Year and aside from giving up smoking, getting fit and laying off the beer, it s also the time when many of us gaze into our crystal balls and try to accurately predict the coming trends in IT and security over the coming year...2009-06-08
Home PC users still vulnerable to rogue dialersHits:4
Rogue dialers work by changing your Internet connection settings so that your computer dials a premium rate telephone number to connect to the Internet. Charges can run as high as 1.50 per minute and the switch sometimes isn t discovered...2009-06-06
Preventon partners with PivX to expand managed ISP security offeringHits:6
Preventon has signed a strategic partnership agreement with PivX Solutions, Inc. As part of the deal Preventon will offer its ISP customers PreView, an online tool powered by PivX that can scan PCs and gauge their vulnerability to future...2009-06-05
The Latest in Internet Attacks: Web Application WormsHits:2
By now, most companies recognize that network security is an important aspect of daily operations, but few realize how quickly new methods of Internet attacks are being invented. While organizations rush to develop their security...2009-06-05
The majority of malware now comes from organizations involved in criminal activityHits:2
Over the past few years those monitoring trends on malicious Internet activities have noticed a significant change. We are seeing a sizeable decrease in the media grabbing pandemic outbreaks of malicious software. Yet with less headlines...2009-06-05
Panda Software TrustLayer Mail ensures that corporate email is free from viruses, spam and maliciousHits:3
Panda Software has launched its new TrustLayer Mail managed security service. This service ensures that corporate email is free from viruses, spam and other malicious or inappropriate content. This service includes manual analysis as...2009-06-05
New security challenges in 2007: instant messaging, mobile networks and illicit contentHits:2
With the New Year comes new security challenges for business of all shapes and sizes. Without compliance to the plethora of new legal requirements and potential threats, organisations place both IT systems and reputation at risk. In 2006...2009-06-04
St. Bernard Software launches LivePrism hosted email, instant message and Web filtering for SMB markHits:4
St. Bernard Software, Inc. has announced the immediate availability of LivePrism, the hosted email, instant message (IM) and Web filtering services designed specifically to address the needs of the SMB market. The offering also includes on...2009-06-04

Home  <<Prev  5   6   7   8   9   10   11   12   13   14   15  Next>>  Last

Current Page:10 , Total 34 Pages, Every Page 15 Records, Total Records: 499

Hot Articles
Recommend Articles
New Articles
Sub category