Information Security



Has your intellectual property been stolen?
August 2010
While snooping continues to rise, IT security is making it harder for insiders to get around controls that protect highly sensitive information. The results of Cyber-Ark Software’s fourth annual Trust, ...

Read more...
Covering the loopholes
August 2010
With physical or virtual protection, how much is enough? A solid network foundation is the key to business agility, process efficiency, productivity, and competitiveness. It provides intelligent services ...

Read more...
Taken to the cleaners, but data safe
28 July 2010, Infrastructure
With Cactus and Attix5, the only real impact is inconvenience

Read more...
Ontology-based intrusion detection and prevention system for networking environments
28 July 2010
A researcher from the Colombia-based University of Caldas has partnered with researchers from the National University of Colombia and Spain-based Pontifical University of Salamanca, to develop an innovative solution for intrusion detection and prevention

Read more...
Count the cost of a lost day
July 2010
One thing you can be sure of with computers is that, eventually, they will break down. When you are busy running an organisation, checking your backup and recovery strategy can be the last thing on your ...

Read more...
iPhone jailbreaking: legal, but dangerous
July 2010
After the announcement that iPhone jailbreaking has become legal in US, a malware-spreading campaign targeting the 'iPhone unlocking' fans goes to confirm that cybercriminals never lack imagination. Owners ...

Read more...
BitDefender v2011
June 2010
BitDefender v2011 has entered the BETA phase and it has been made public. This is an opportunity for testers to get an exclusive preview of BitDefender's upcoming release, and to play an active role ...

Read more...
Adobe products: the number one target for hackers in the first quarter of 2010
15 June 2010
When added together, two families of exploits targeting Adobe products, Exploit.Win32.Pdfka and Exploit.Win32.Pidief, account for a total of 47,5%, or nearly half of all detected exploits

Read more...
New version of MailMarshal available
15 June 2010
MailMarshal SMTP 6.7 combines content security, defence-in-depth anti-spam engine, blended threat detection and IP reputation analysis and applies this to both inbound and outbound email communications

Read more...
Office 2010 beta impersonator is Trojan
June 2010
The 'big name' cybercrime series continues with an alleged Office 2010 Beta version used as bait. Just a week after the alert on the fake Windows 7 compatibility checker, another interesting e-mail came ...

Read more...
Wireless security is viable
June 2010
Winston Smith, MD of Alvarion in South Africa, discusses wireless security.    What bearing does wireless networks have on security?    Winston Smith: Large-scale metro area networks are becoming an increasingly ...

Read more...
Surveillance, storage and your options
June 2010
Vassen Naicker examines the non-glamorous side of surveillance. A report by IMS Research, released two years ago: the ‘World market for external storage used for video surveillance’ predicted that by ...

Read more...
Smart smartphone security
June 2010
Biodata offers advice on protecting your smartphone. You make calls, send SMSes, browse the web and communicate via social networks every day, so it makes sense to protect your phone from unwelcome attention. ...

Read more...
BitDefender testing of encryption software on Intel Core i5 processors
June 2010
Testing program demonstrates how BitDefender software can take advantage of the most advanced Intel hardware and create a better computing experience for users. BitDefender engineers have completed an ...

Read more...
To hack or not to hack MSN accounts
June 2010
A mass mail invitation to a suspicious 'do-it-yourself' account hacking session puts Windows Live Messenger users at risk. The e-mail marking the first step of this data harvesting scheme is very likely ...

Read more...
Free iPad used as bait in Facebook – advertised phishing scheme
June 2010
Social networking is so good even for illegitimate marketing campaigns. How would you like to get one of the much-anticipated iPad gizmos in exchange for simply filling up a mere survey? Well, the offer ...

Read more...
Half of organisations say cloud computing will improve security
21 May 2010
Cloud technology actually raises the industry's game on the security front

Read more...
Veeam SureBackup available through Workgroup
21 May 2010
Veeam’s expanded SureBackup capabilities test and verify the recoverability of every backup of every virtual machine

Read more...
Blueprint your IPMS - Part 2
May 2010, Integrated Solutions
The March 2010 edition of Hi-Tech Security Solutions featured Part 1 on Blueprinting your Integrated People Management Solutions (IPMS). Part 2 follows. In the March article, it was highlighted that ...

Read more...
Magix boosts enterprise data protection
May 2010
Magix Integration has announced it has obtained the rights to supply the Varonis range of data protection and preservation products. Varonis protects corporate data while making it easily available to ...

Read more...



<< First   < Previous   Page 67 of 85   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.