Your are here:hacking technology > the virus to be related > Article list

GFI MailSecurity 10 features Grisoft anti-virus engine and RSS quarantine feedsHits:6
GFI Software has announced that GFI MailSecurity 10 is now available. The latest version features a new anti-virus engine, GRISOFT AVG, guaranteeing a higher detection rate and faster response to new viruses, and RSS quarantine feeds...07/23/2009
DNSChanger.eg Trojan redirects users to spoofed websites of banks, credit card firms and online shopHits:5
DNSChanger.eg is a high risk potential Trojan that can redirect users to spoofed websites of leading banks, credit card firms and online shops. DNSChanger.eg works by corrupting the process of translating a domain name to the...07/23/2009
Access to spyware related sites by employees in large organisations is reaching critical levelsHits:5
Spyware attracts a great deal of attention, but the threat should not be underestimated. It is not only designed to get around traditional technological defences, but also designed to take advantage of how employees use technology....07/22/2009
CP Secure Content Security Gateway now integrated with Websense Web Security SuiteHits:7
Increasingly, malware programs attack through web traffic. While most organizations have been focused on securing their e-mail traffic, malware programs have been successfully attacking through the web vector since the 2001 Nimda worm....07/22/2009
Complex ransomware is beyond the decryption capabilities of the anti-virus industryHits:6
Ransomware involves the use of malicious code to hijack user files, encrypt them and then demand payment in exchange for the decryption key.The first piece of ransomware to use a sophisticated encryption algorithm, Gpcode.ac, was...07/21/2009
SurfControl protects South Yorkshire Housing Association email systems from Internet threats, spam,Hits:8
South Yorkshire Housing Association (SYHA) has signed a deal with BlackSpider Technologies, an on-demand security service from SurfControl plc, to protect its email systems from Internet threats including spam, viruses and harmful content....07/21/2009
Artificial Intelligence and Google malware searches are latest tools in the hacker toolboxHits:9
Artificial intelligence (AI) software used in testing by a small number of software developers is now being widely used by hackers to find formerly undiscovered vulnerabilities. These AI tools use a methodology referred to as Fuzzing. This...07/20/2009
3ami IT security software monitors and audits Royal London computersHits:6
Royal London, the leading mutual Life and Pension company, has installed new security software designed by 3ami, that can monitor the computer-based activity of its 2,900 staff across the UK. Strong security controls are an important...07/18/2009
Nisat Uses NetClarity Auditor for Network Security Auditing and Clientless Network Admission ControlHits:15
Nisat communications Ltd. has selected the NetClarity Auditor as its Vulnerability Management and Network Admission Control (NAC) solution to enter the Grecian market. CVEs (Common Vulnerabilities and Exposures) are the root of 95%...07/18/2009
AppGate remote network security solution gives Cleeve School students and staff secure access to schHits:7
Cleeve School has installed advanced remote access capabilities and a wireless hotspot on its IT network, giving 1,500 students and staff flexible and secure access to school resources round the clock and providing an enhanced learning...07/17/2009
Sophos protects Johnston Press users from computer threatsHits:11
Johnston Press, the UK's second largest publisher of regional newspapers, has deployed Sophos's new ES4000 email security appliance, Sophos Anti-Virus and PureMessage for Windows/Exchange to protect its 9,000 users across more than 250...07/17/2009
Hardware failure and human error are still the top threats to computer usersHits:4
Remote Backup Systems, Inc. has announced the release of the top threats to computer users. The list underscores the critical nature of automated, secure, remote data backup as the major component in both disaster preparation and...07/16/2009
Dramatic reduction in viral email traffic indicates that malware authors now prefer Trojan horse tarHits:6
While the Netsky-P worm, first seen in March 2004, remains the most widespread piece of malware travelling via email, the actual proportion of infected email has dropped to a low of just one in 222 (0.45 percent). This compares...07/16/2009
Majority of worms, viruses, spams and Trojans originate in the Far EastHits:15
According to Network Box, the Far East, specifically Malaysia, China and the Philippines, was seen as the major source of malware during July. The company's security responses blocked more than a million worms, viruses and Trojans daily,...07/15/2009
Gold Edition of TrustDefender protects online businesses and consumers from Online Banking and PhishHits:6
TrustDefender has announced the availability of the TrustDefender Gold Edition Beta securing consumer and business confidence in online transactions while protecting users' confidential information from Online Banking and Phishing scams....07/15/2009

Home  <<Prev  1   2   3   4   5   6   7   8   9   10   11  Next>>  Last

Current Page:6 , Total 34 Pages, Every Page 15 Records, Total Records: 499

Hot Articles
Recommend Articles
New Articles
Sub category