Your are here:hacking technology > the virus to be related > Article list

The traditional approach to network security leaves IP-based network devices within the VLAN open toHits:4
All things change, and we change with them, goes the ancient Chinese proverb. There could not be a more fitting way of describing the challenges IT Directors are faced with in 2006 as they tackle day-to-day obstacles in keeping corporate...07/31/2009
Targeted criminal malware, rootkits and mobile malware are the new 2006 threatsHits:4
During the first six months of 2006, expertly targeted criminal malware attacks and exploits have been on the increase and become extremely well hidden, resulting in criminals successfully finding new ways to deliver their payloads...07/30/2009
Copperfasten Mail Firewall Appliance protecting staff and student email accounts at De Montfort UnivHits:29
ITS Feda Ltd. has implemented the Copperfasten Mail Firewall Appliance in De Montfort University protecting over 35,000 staff and student email accounts from viruses, spam, malware and unwanted content. De Montfort chose the Copperfasten...07/30/2009
SonicWALL CSM 3200 extends Internet access control and Threat Management to mid-sized organizationsHits:16
SonicWALL, Inc. has extended its Content Security Manager (CSM) series with an enhanced appliance designed for organisations of up to 1,000 concurrent users. The CSM 3200 allows IT administrators to streamline network security management...07/29/2009
TalkTalk selects F-Secure to offer free anti-virus protection to its Internet customersHits:106
F-Secure has been selected by TalkTalk, the communications company from The Carphone Warehouse, to offer free anti-virus protection for 90 days to those who sign up for its Talk3 International tariff. In response to the changing needs of...07/29/2009
Sygate Security Portal launchedHits:1
Sygate has released the Sygate Security Portal, a new product that extends policy enforcement and endpoint security measures to non-corporate owned devices across the value chain such as consultant or contractor equipment, employee...07/28/2009
Basic security flaws are being ignored by UK companiesHits:3
UK companies and public sector organisations have left themselves wide open to a rising tide of medium- and low-level security flaws, as they fight to deal with high risk security flaws. NTA Monitor reports that almost a third of companies...07/28/2009
Bluetooth-enabled devices in visible to all mode are wide open to attackHits:5
People are not aware of the security risk posed by Bluetooth, according to research by Kaspersky Lab. The company conducted research in London and in the space of three days detected more than 2,000 Bluetooth-enabled devices in 'visible to...07/28/2009
MessageLabs Managed Web Anti-Spyware, Anti-Virus and URL Filtering Services Now Fully Integrated WitHits:5
MessageLabshas announced the launch of version 2.0 of its Web Security Services. The new services have been developed on a proprietary MessageLabs web scanning architecture and feature full integration with MessageLabs existing email and...07/28/2009
Is device control sufficient to ensure endpoint security?Hits:2
In the wake of the increased focus on endpoint security, controlling the use of devices that can be attached to endpoints, especially memory devices like USB memory sticks, has become of paramount importance to companies. While this is...07/27/2009
UK and Finnish Police arrest members of the M00P virus-writing gangHits:3
The Metropolitan Police's Computer Crime Unit, the Finnish National Bureau of Investigation (NBI Finland) and the Finnish Pori Police Department, have arrested a 63-year-old man in Suffolk, a 28-year-old man in Scotland, and a 19...07/27/2009
Trend Micro anti-spyware protects the National Missing Persons Helpline users from attacksHits:5
The National Missing Persons Helpline (NMPH), the UK's charity dedicated to finding missing persons and supporting those left behind, has announced it will extend its suite of security solutions deployed by Trend Micro. Each summer...07/25/2009
Fiberlink and SecureWave partner to protect corporate data against theft at the device levelHits:5
According to leading research firm In-Stat, shipments of USB-enabled devices will reach 2.8 billion in 2010. These USB-connected devices can create an insecure two-way avenue that allows confidential company information to be carried out...07/25/2009
Bluetooth applications in the City of London trees are a danger to businessesHits:2
IBM has fitted the trees in the City of London with Bluetooth applications for mobile phone users in the area. This is a further step towards making the City of London one of the most technological advanced cities in the world capitalising...07/24/2009
Sharp rise in cosmetic company's stock price following pump and dump spam stock campaignHits:5
Pump and dump stock campaigns work by spammers purchasing stock at a cheap price and then artificially inflating its price by encouraging others to purchase more (often by spamming good news about the company to others). The spammers...07/24/2009

Home  <<Prev  1   2   3   4   5   6   7   8   9   10   11  Next>>  Last

Current Page:5 , Total 34 Pages, Every Page 15 Records, Total Records: 499

Hot Articles
Recommend Articles
New Articles
Sub category