Information Security



IntraVUE Ethernet communications
September 2010, LAPP Southern Africa
Ethernet network issues can start as unknown nuisances and grow into large or more complex problems. Many unpredictable issues are induced by harsh environments or changes in your applications. An intermittent ...

Read more...
BitDefender Total Security 2010 Receives top score from PC Security Labs Total Protection Test
September 2010
Antivirus software awarded five stars for high malware detection scores and minimal false positives. BitDefender has announced that BitDefender Total Security 2010 obtained the Top Score award from PC ...

Read more...
Rogue employees sell on World Cup fans' passport data
September 2010
Reports are coming in that the Information Commissioner's Office has started investigating FIFA, the world football governing body, over allegations that details of thousands of World Cup fans' data - ...

Read more...
BitDefender releases emergency ZBot removal tool
September 2010
Standalone utility available for download free of charge on Malwarecity. BitDefender has posted a removal tool for the infamous ZBot. While ZBot or ZeusBot focuses mainly on the online banking details ...

Read more...
Facebook Hacker – a dangerous tool
24 August 2010
A do-it-yourself kit that will enable ill-intentioned people to steal usernames and passwords to all sorts of accounts

Read more...
BitDefender malware and spam report finds e-threats exploiting Web 2.0 platforms
August 2010
PayPal, eBay, HSBC top-phished institutions; China and Russia hosting majority of malware - predictions for malware activity over the second half of the year BitDefender has released a report that found ...

Read more...
Has your intellectual property been stolen?
August 2010
While snooping continues to rise, IT security is making it harder for insiders to get around controls that protect highly sensitive information. The results of Cyber-Ark Software’s fourth annual Trust, ...

Read more...
Covering the loopholes
August 2010
With physical or virtual protection, how much is enough? A solid network foundation is the key to business agility, process efficiency, productivity, and competitiveness. It provides intelligent services ...

Read more...
Taken to the cleaners, but data safe
28 July 2010, Infrastructure
With Cactus and Attix5, the only real impact is inconvenience

Read more...
Ontology-based intrusion detection and prevention system for networking environments
28 July 2010
A researcher from the Colombia-based University of Caldas has partnered with researchers from the National University of Colombia and Spain-based Pontifical University of Salamanca, to develop an innovative solution for intrusion detection and prevention

Read more...
Count the cost of a lost day
July 2010
One thing you can be sure of with computers is that, eventually, they will break down. When you are busy running an organisation, checking your backup and recovery strategy can be the last thing on your ...

Read more...
iPhone jailbreaking: legal, but dangerous
July 2010
After the announcement that iPhone jailbreaking has become legal in US, a malware-spreading campaign targeting the 'iPhone unlocking' fans goes to confirm that cybercriminals never lack imagination. Owners ...

Read more...
BitDefender v2011
June 2010
BitDefender v2011 has entered the BETA phase and it has been made public. This is an opportunity for testers to get an exclusive preview of BitDefender's upcoming release, and to play an active role ...

Read more...
Adobe products: the number one target for hackers in the first quarter of 2010
15 June 2010
When added together, two families of exploits targeting Adobe products, Exploit.Win32.Pdfka and Exploit.Win32.Pidief, account for a total of 47,5%, or nearly half of all detected exploits

Read more...
New version of MailMarshal available
15 June 2010
MailMarshal SMTP 6.7 combines content security, defence-in-depth anti-spam engine, blended threat detection and IP reputation analysis and applies this to both inbound and outbound email communications

Read more...
Office 2010 beta impersonator is Trojan
June 2010
The 'big name' cybercrime series continues with an alleged Office 2010 Beta version used as bait. Just a week after the alert on the fake Windows 7 compatibility checker, another interesting e-mail came ...

Read more...
Wireless security is viable
June 2010
Winston Smith, MD of Alvarion in South Africa, discusses wireless security.    What bearing does wireless networks have on security?    Winston Smith: Large-scale metro area networks are becoming an increasingly ...

Read more...
Surveillance, storage and your options
June 2010
Vassen Naicker examines the non-glamorous side of surveillance. A report by IMS Research, released two years ago: the ‘World market for external storage used for video surveillance’ predicted that by ...

Read more...
Smart smartphone security
June 2010
Biodata offers advice on protecting your smartphone. You make calls, send SMSes, browse the web and communicate via social networks every day, so it makes sense to protect your phone from unwelcome attention. ...

Read more...
BitDefender testing of encryption software on Intel Core i5 processors
June 2010
Testing program demonstrates how BitDefender software can take advantage of the most advanced Intel hardware and create a better computing experience for users. BitDefender engineers have completed an ...

Read more...



<< First   < Previous   Page 66 of 85   Next >   Last >>