To hack or not to hack MSN accounts June 2010 A mass mail invitation to a suspicious 'do-it-yourself' account hacking session puts Windows Live Messenger users at risk.
The e-mail marking the first step of this data harvesting scheme is very likely ...
Free iPad used as bait in Facebook – advertised phishing scheme June 2010 Social networking is so good even for illegitimate marketing campaigns.
How would you like to get one of the much-anticipated iPad gizmos in exchange for simply filling up a mere survey? Well, the offer ...
Blueprint your IPMS - Part 2 May 2010, Integrated Solutions The March 2010 edition of Hi-Tech Security Solutions featured Part 1 on Blueprinting your Integrated People Management Solutions (IPMS). Part 2 follows.
In the March article, it was highlighted that ...
Magix boosts enterprise data protection May 2010 Magix Integration has announced it has obtained the rights to supply the Varonis range of data protection and preservation products. Varonis protects corporate data while making it easily available to ...
iPad users targeted by backdoor dissembled as iTunes update May 2010 An e-mail invitation to an iTunes update gets iPad users’ PCs into backdoor trouble.
Success stories are cybercriminals’ go to sources of victims and the iPad craze could not have been left out of ...
Extremely aggressive worm chokes instant messaging May 2010 New variant of Palevo blasts unprotected systems via fake photo gallery links.
The latest offspring of the Palevo family has begun spreading these days via a massive wave of automatically generated IM ...
Top five e-threats – April 2010 May 2010 April’s top brings forward two newcomers: a fake AV and a Trojan.Keygen!
April is the third month in a row in which Trojan.AutorunInf.Gen is the top e-threat with 13,21% of the total amount of the global ...
On-line shopping for Mother’s Day May 2010 Husbands and teenage children need to pay great attention to on-line transactions of all kinds
According to an independent research conducted by Dept Information System, University of Cape Town “the ...
Windows 7 compatibility checker turns out to be a Trojan May 2010 A deceptive 'help' message invites recipients to check their PCs’ compatibility with Windows 7 by downloading and running an altered version of Windows 7 Upgrade Advisor concealing a Trojan.
Cybercriminals ...
Network and data security remains a top concern 28 April 2010 It is imperative that organisations adopt an holistic approach that encompasses security right from the core to the perimeter of the network
Information must be protected April 2010 Hi-Tech Security Solutions spoke to five experts in the data protection field to find out what companies should be doing to protect their data
A byte of compliance April 2010 Protecting sensitive information today is part of the whole process of securing companies’ IT infrastructures. Unfortunately, with the myriad threats facing companies from external and internal sources, ...
Audio steganography April 2010 In the past decade, steganography, or the art of concealing information within seemingly innocuous digital platforms and carriers, has emerged into a hot area of research. This is due to its increasing ...
Bandwidth and storage considerations March 2010, Axis Communications SA The factors include the number of cameras, the image resolution used, the compression type and ratio, frame rates and scene complexity
Blueprint your IPMS March 2010, Integrated Solutions The most common mistake companies make before embarking on a technology implementation or modernisation project is to solicit bids from vendors prior to developing a blueprint or requirements specification. ...
Condyn adds to its arsenal March 2010 Condyn has expanded its IT security distribution network with the addition of Trend Micro and McAfee.
Trend Micro has appointed information security solution provider, Condyn, as a distributer for the ...