Information Security



iPhone jailbreaking: legal, but dangerous
July 2010
After the announcement that iPhone jailbreaking has become legal in US, a malware-spreading campaign targeting the 'iPhone unlocking' fans goes to confirm that cybercriminals never lack imagination. Owners ...

Read more...
BitDefender v2011
June 2010
BitDefender v2011 has entered the BETA phase and it has been made public. This is an opportunity for testers to get an exclusive preview of BitDefender's upcoming release, and to play an active role ...

Read more...
Adobe products: the number one target for hackers in the first quarter of 2010
15 June 2010
When added together, two families of exploits targeting Adobe products, Exploit.Win32.Pdfka and Exploit.Win32.Pidief, account for a total of 47,5%, or nearly half of all detected exploits

Read more...
New version of MailMarshal available
15 June 2010
MailMarshal SMTP 6.7 combines content security, defence-in-depth anti-spam engine, blended threat detection and IP reputation analysis and applies this to both inbound and outbound email communications

Read more...
Office 2010 beta impersonator is Trojan
June 2010
The 'big name' cybercrime series continues with an alleged Office 2010 Beta version used as bait. Just a week after the alert on the fake Windows 7 compatibility checker, another interesting e-mail came ...

Read more...
Wireless security is viable
June 2010
Winston Smith, MD of Alvarion in South Africa, discusses wireless security.    What bearing does wireless networks have on security?    Winston Smith: Large-scale metro area networks are becoming an increasingly ...

Read more...
Surveillance, storage and your options
June 2010
Vassen Naicker examines the non-glamorous side of surveillance. A report by IMS Research, released two years ago: the ‘World market for external storage used for video surveillance’ predicted that by ...

Read more...
Smart smartphone security
June 2010
Biodata offers advice on protecting your smartphone. You make calls, send SMSes, browse the web and communicate via social networks every day, so it makes sense to protect your phone from unwelcome attention. ...

Read more...
BitDefender testing of encryption software on Intel Core i5 processors
June 2010
Testing program demonstrates how BitDefender software can take advantage of the most advanced Intel hardware and create a better computing experience for users. BitDefender engineers have completed an ...

Read more...
To hack or not to hack MSN accounts
June 2010
A mass mail invitation to a suspicious 'do-it-yourself' account hacking session puts Windows Live Messenger users at risk. The e-mail marking the first step of this data harvesting scheme is very likely ...

Read more...
Free iPad used as bait in Facebook – advertised phishing scheme
June 2010
Social networking is so good even for illegitimate marketing campaigns. How would you like to get one of the much-anticipated iPad gizmos in exchange for simply filling up a mere survey? Well, the offer ...

Read more...
Half of organisations say cloud computing will improve security
21 May 2010
Cloud technology actually raises the industry's game on the security front

Read more...
Veeam SureBackup available through Workgroup
21 May 2010
Veeam’s expanded SureBackup capabilities test and verify the recoverability of every backup of every virtual machine

Read more...
Blueprint your IPMS - Part 2
May 2010, Integrated Solutions
The March 2010 edition of Hi-Tech Security Solutions featured Part 1 on Blueprinting your Integrated People Management Solutions (IPMS). Part 2 follows. In the March article, it was highlighted that ...

Read more...
Magix boosts enterprise data protection
May 2010
Magix Integration has announced it has obtained the rights to supply the Varonis range of data protection and preservation products. Varonis protects corporate data while making it easily available to ...

Read more...
iPad users targeted by backdoor dissembled as iTunes update
May 2010
An e-mail invitation to an iTunes update gets iPad users’ PCs into backdoor trouble.  Success stories are cybercriminals’ go to sources of victims and the iPad craze could not have been left out of ...

Read more...
Extremely aggressive worm chokes instant messaging
May 2010
New variant of Palevo blasts unprotected systems via fake photo gallery links. The latest offspring of the Palevo family has begun spreading these days via a massive wave of automatically generated IM ...

Read more...
Top five e-threats – April 2010
May 2010
April’s top brings forward two newcomers: a fake AV and a Trojan.Keygen! April is the third month in a row in which Trojan.AutorunInf.Gen is the top e-threat with 13,21% of the total amount of the global ...

Read more...
On-line shopping for Mother’s Day
May 2010
Husbands and teenage children need to pay great attention to on-line transactions of all kinds According to an independent research conducted by Dept Information System, University of Cape Town “the ...

Read more...
Windows 7 compatibility checker turns out to be a Trojan
May 2010
A deceptive 'help' message invites recipients to check their PCs’ compatibility with Windows 7 by downloading and running an altered version of Windows 7 Upgrade Advisor concealing a Trojan. Cybercriminals ...

Read more...



<< First   < Previous   Page 68 of 86   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.