Information Security



Biometrics and information security management systems
Access & Identity Management Handbook 2011
Biometrics goes far beyond physical access control. Charlie Stewart of biometric application specialists, SuperVision Biometric Systems, says that information security management systems (ISMS) and data ...

Read more...
Fixing weak passwords
Access & Identity Management Handbook 2011
Passwords have been with us for ages, administrators and users need to rethink password security policies if they are to be truly effective. Passwords have been present in information technology since ...

Read more...
G&D launches the Mobile Security Card VE 2.0
14 December 2010, Security Services & Risk Management
Giesecke & Devrient (G&D) is introducing a new microSD card to prevent cellphone tapping

Read more...
BlackBerry 6 Gains FIPS security certification
14 December 2010, News & Events
BlackBerry Torch and other BlackBerry smartphones running the new BlackBerry 6 OS now certified for use by US government agencies

Read more...
Lawyers cite electronically stored information as cause for lost cases
14 December 2010, News & Events, Security Services & Risk Management
According to the South African lawyers polled, 72% found ESI to be a critical part of their daily legal matters

Read more...
McAfee Security Management 5 available
14 December 2010, Products & Solutions
McAfee Security management 5 zones in on four key areas in an attempt to address security threat requirements

Read more...
Protect your identity
30 November 2010, Ideco Biometrics, Access Control & Identity Management
Phishing is a common process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication

Read more...
Panda Security launches new version of Panda Cloud Internet Protection
30 November 2010
The new cloud-managed security solution delivers protection for corporate environments against all types of Internet threats, including botnets, phishing, cross-site scripting and other advanced Web attacks

Read more...
Datatec acquires Biodata
November 2010, News & Events
Datatec has announced that it has acquired niche South African security specialists Biodata IT SA, with the intention of merging the business into Westcon SA’s security division. The acquisition forms ...

Read more...
CA acquires Arcot
November 2010, News & Events
CA Southern Africa has announced the acquisition of Arcot Systems by CA Technologies for $200 million. According to Ugan Naidoo, MD Security, CA Southern Africa, the acquisition of Arcot – a leader ...

Read more...
Trojan.Spy.YEK, the corporate spying tool
1 November 2010
Spying Trojan that looks for documents and archives that may hold private information and sends it back to the attacker. The Stuxnet troubles are long from being forgotten and any sign of outside intrusion ...

Read more...
BitDefender announces launch of free edition of award-winning antispam for Linux mail servers
1 November 2010
Provides essential features, free of charge, for increased productivity by blocking spam on Linux-based mail servers. BitDefender, the award-winning provider of innovative Internet security solutions, ...

Read more...
Tips for safe shopping on mobile devices and social media sites this holiday season
1 November 2010
Internet security solutions provider BitDefender, offers expert advice for staying safe while shopping online. BitDefender has announced 2010’s best practices for safe holiday shopping to ensure consumers ...

Read more...
Over 30 million vulnerabilities detected on users’ computers
20 October 2010, News & Events
Using browsers such as Google Chrome, Mozilla Firefox and Internet Explorer that come with inbuilt filters that block phishing and other malicious websites will help reduce the risk of being infected

Read more...
BitDefender releases free removal tool for Carberp Trojan
20 October 2010
Standalone utility available for free download on MalwareCity.com to protect against growing threat from potent banking Trojan

Read more...
BitDefender Top 5 malware list for South Africa
October 2010
The first place in the quarterly chart for South Africa is taken by Trojan.AutorunInf.Gen, with a percentage of 14,49. This Trojan is constantly amongst the most 'popular' e-threats as it easily spreads ...

Read more...
Identity-based WLAN security
October 2010, Infrastructure
Identity-based security provides complete trace of guest user activity. Cyberoam, a division of Elitecore Technologies, has announced the launch of its wireless network security appliance, the CR15wi, ...

Read more...
Secured password management
October 2010
As the use of Internet services surges, end users are required to have multiple passwords for everything from e-mail services to e-banking applications and corporate accounts. Additionally, they are required ...

Read more...
BitDefender offers free removal tool for Stuxnet
October 2010
Standalone utility available for download free of charge on Malwarecity. BitDefender, an award-winning provider of innovative anti-malware security solutions, released a free removal tool targeting Win32.Worm.Stuxnet. ...

Read more...
Winamp 0-day exploit opens backdoors
October 2010
Audio files downloaded from file-sharing websites can actually set you up. On 15 October, the BitDefender labs came across four critical vulnerabilities affecting Winamp 5.x. Shortly thereafter, several ...

Read more...



<< First   < Previous   Page 67 of 87   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.