Your are here:hacking technology > the virus to be related > Article list

Disaster recovery and business continuity with burgeoning data volumesHits:1
Data loss comes in all shapes and sizes. It might be the result of accidental deletion, corruptions, viruses, hardware failure or site disasters. Whatever the cause, it can severely damage the reputation of the company and put the business...2009-07-06
Macdonald Hotels and Resorts implement AppGate secure remote access solutionHits:2
Macdonald Hotels and Resorts, the UK's largest privately owned hotel group, has implemented a secure remote access solution from AppGate to enable staff and managers to use laptops to access the corporate network securely from any location...2009-07-01
New Stay Safe Online guide to protect home PC users from spyware and malwareHits:3
According to a new government survey 'get safe online', more people fear net crime than burglary. Another recent survey by Kaspersky of PC-literate home PC users shows 63 percent believe that spyware is responsible for compromising the...2009-07-01
BT implements spam buster system to block professional spammers and botnet-infected customersHits:1
Around 80 per cent of e-mails on the internet, equivalent to 6.5 billion emails a day, are spam. These unwanted emails are not only generated by professional spammers, but also by botnets - where the PCs of unsuspecting customers are...2009-06-30
Malicious code remains stored on storage and caching servers even after a website containing malwareHits:2
Finjan Inc. has uncovered malicious code stored on storage and caching servers, such as those used by ISPs, enterprises and leading search engines. This means that even after a website containing malicious code has been removed...2009-06-30
McAfee security risk management strategy integrates security and complianceHits:2
A comprehensive security risk management approach must include threat prevention capabilities such as anti-virus, intrusion prevention, and anti-spyware - all integrated with compliance management capabilities such as policy enforcement,...2009-06-26
Biggest threat is now spyware, not web virusesHits:1
ScanSafe has released its latest Global Threat Report on Web filtering, spyware and viruses. Among the report s key findings, ScanSafe reported that Web viruses decreased 47 percent in September, despite recent high-profile Microsoft...2009-06-26
Rising amount of portable storage devices is causing an unprecedented security riskHits:3
As flexible working practices become more popular, USB drives are becoming cheaper and have bigger memories, and, as a result, can hold large amounts of information. Viruses can open and run automatically, as soon as a USB device...2009-06-24
Hackers can also infiltrate production line networksHits:3
New techniques used by hackers which can allow zombies to go undetected by internet security systems are a serious threat to an organisation's production lines not just office based networks, according to industrial security specialist...2009-06-24
Aventail SSL VPN provides universities with secure remote access to campus Wi-Fi networksHits:12
IT administrators in universities are now strategically approaching their security infrastructure, selecting remote access solutions that provide students, facility and staff with easy, reliable access to their applications no matter where...2009-06-23
Flybe reduces exposure to email threats and simplifies security management with Sophos security soluHits:3
Flybe is deploying Sophos security solutions across more than 30 sites, in order to reduce exposure to emerging threats and simplify security management. Scheduled for completion in December 2006, the rollout will benefit 1,600 Flybe...2009-06-23
ScanSafe Web Filtering, Web Virus Scanning and Spyware Screening services protect Paul Smith FashionHits:2
Paul Smith is using ScanSafe Web Filtering, Web Virus Scanning and Spyware Screening services to protect its network from an increasing number of malware threats and to control use of the Internet by its employees. Paul Smith 12 individual...2009-06-22
CSG 2500 Web anti-malware appliance stops spyware and viruses at the gatewayHits:2
The Web is fast becoming the most dangerous source of malware attacks. A recent RSA Conference survey noted that while 29% of IT security professionals ranked email viruses as their most significant threat, Web viruses were listed as the...2009-06-22
Surviving a Security Breach: Assume the worst will happen and plan for itHits:5
When analysing threats to an organisation we need to calculate the risk each threat poses. Risk is comprised of two elements probability and impact. The negative impacts which would result from a threat materialising can be determined...2009-06-20
ArcSight Protects Swisscom Mobile Customers and Network from Viruses and MalwareHits:2
ArcSight, Inc. has announced that Swisscom Mobile, the leading mobile communications provider in Switzerland, has deployed ArcSight ESM to correlate and identify patterns within their wireless access infrastructure for the purposes...2009-06-20

Home  <<Prev  3   4   5   6   7   8   9   10   11   12   13  Next>>  Last

Current Page:8 , Total 34 Pages, Every Page 15 Records, Total Records: 499

Hot Articles
Recommend Articles
New Articles
Sub category