Your are here:hacking technology > the virus to be related > Article list

IBM Internet Security Systems Provides Desktop Protection with BitDefender Antivirus and Anti-SpywarHits:1
IBM has announced it has incorporated additional features for antivirus and anti-spyware into its Internet Security Systems Proventia Desktop Endpoint Security product. The combined feature set will provide customers with a comprehensive...2009-06-19
Is the hacking community running out of fresh ideas?Hits:2
According to a new report by Kaspersky Lab, the hacking community has run out of fresh ideas when it comes to creating new malware. Malware Evolution: July September 2006 states that while the hacking community is developing proof...2009-06-19
ArcSight ESM Solution Manages Sensitive Information Critical to Protecting Oil and Gas IT NetworksHits:2
Oil and gas companies have recognised that their computerised process control systems need to be carefully protected against cyber security threats. Because of increased automation and the introduction of new computer and...2009-06-18
Cyber Security Knowledge Transfer Network turns to psychologists and sociologists to address IT secuHits:1
A national cyber security network is turning to experts in human behaviour, including psychologists and sociologists, in order to address IT security problems caused by human users. By learning how other unrelated sectors and domains...2009-06-18
F-Secure unveils protection against patchless vulnerabilitiesHits:2
F-Secure has announced the availability of the industry's first fully integrated vulnerability protection to include defence against so-called zero-day attacks. Such attacks, which exploit vulnerabilities for which there is...2009-06-17
Vital industrial networks must be protected from hackersHits:3
It was recently reported that foreign hackers infiltrated security at a US water filtering plant uploading malicious software. These computer systems control a vital part of the plant infrastructure and if they fail it could have...2009-06-17
MessageLabs Small Business Solutions address key security challenges facing smaller businessesHits:10
The necessity for small business Internet security is confirmed in the latest MessageLabs Intelligence analysis announced today. Spam continues to be a major threat to all businesses with global spam levels in November reaching...2009-06-17
WinMagic full-disk encryption software fully supports Microsoft Windows VistaHits:5
WinMagic Inc. has announced that its SecureDoc v.4.2 SR4 full-disk encryption software now fully supports Microsoft Windows Vista. SecureDoc is positioned to compliment Windows Vista Home Basic, Windows Vista Home Premium...2009-06-16
Attacks on businesses continue to rise despite efforts to reduce themHits:3
Attacks on businesses, particularly financial institutions, show no sign of abating despite concerted efforts to reduce them, according to Computers, Networks and Theft: Part 2, a new report published by Kaspersky Lab. The report found...2009-06-16
ControlGuard offers free protection against USB and wireless security threatsHits:3
ControlGuard has announced it is offering software and service free of charge for a limited time to help companies understand and protect against the USB and wireless security threats associated with this holiday season's...2009-06-15
Most websites are still vulnerable to cross-site scriptingHits:4
According to IMRG, online shopping should hit 180 million per day leading up to Christmas, i.e. more than double the 82 million average for the rest of the year. But with retail web applications being bombarded by Christmas shoppers will...2009-06-15
Primary Response Air Cover provides wireless threat protection from sniffing, hijacking and malwareHits:2
Sana Security, Inc. has announced Primary Response Air Cover, a standalone product for PCs that provides threat protection of online identity and sensitive data from wireless exploits such as sniffing, hijacking and malware...2009-06-13
Filtering out the hype from email content securityHits:4
Corporate email is at risk. Vulnerable to external attack from viruses, spam, spyware and phishing technologies. And vulnerable to abuse from within, which could result in: acceptable use policies being compromised; regulatory compliance...2009-06-13
Microsoft Word vulnerability can thrust Trojan Downloaders into computersHits:3
A new vulnerability has been identified in Microsoft Word, which can successfully thrust Trojan Downloaders into user computers. According to MicroWorld Experts, a specially crafted Word file carrying a Trojan Dropper named...2009-06-12
Kaspersky believes Windows Vista cannot guarantee protection against malwareHits:2
According to Natalya Kaspersky, CEO of Kaspersky Lab, Microsoft is unlikely to be at the vanguard of anti-virus, despite the security enhancements of Vista and its standalone anti-malware product, OneCare. Kasperksy...2009-06-12

Home  <<Prev  4   5   6   7   8   9   10   11   12   13   14  Next>>  Last

Current Page:9 , Total 34 Pages, Every Page 15 Records, Total Records: 499

Hot Articles
Recommend Articles
New Articles
Sub category