Information Security



Office 2010 beta impersonator is Trojan
June 2010
The 'big name' cybercrime series continues with an alleged Office 2010 Beta version used as bait. Just a week after the alert on the fake Windows 7 compatibility checker, another interesting e-mail came ...

Read more...
Wireless security is viable
June 2010
Winston Smith, MD of Alvarion in South Africa, discusses wireless security.    What bearing does wireless networks have on security?    Winston Smith: Large-scale metro area networks are becoming an increasingly ...

Read more...
Surveillance, storage and your options
June 2010
Vassen Naicker examines the non-glamorous side of surveillance. A report by IMS Research, released two years ago: the ‘World market for external storage used for video surveillance’ predicted that by ...

Read more...
Smart smartphone security
June 2010
Biodata offers advice on protecting your smartphone. You make calls, send SMSes, browse the web and communicate via social networks every day, so it makes sense to protect your phone from unwelcome attention. ...

Read more...
BitDefender testing of encryption software on Intel Core i5 processors
June 2010
Testing program demonstrates how BitDefender software can take advantage of the most advanced Intel hardware and create a better computing experience for users. BitDefender engineers have completed an ...

Read more...
To hack or not to hack MSN accounts
June 2010
A mass mail invitation to a suspicious 'do-it-yourself' account hacking session puts Windows Live Messenger users at risk. The e-mail marking the first step of this data harvesting scheme is very likely ...

Read more...
Free iPad used as bait in Facebook – advertised phishing scheme
June 2010
Social networking is so good even for illegitimate marketing campaigns. How would you like to get one of the much-anticipated iPad gizmos in exchange for simply filling up a mere survey? Well, the offer ...

Read more...
Half of organisations say cloud computing will improve security
21 May 2010
Cloud technology actually raises the industry's game on the security front

Read more...
Veeam SureBackup available through Workgroup
21 May 2010
Veeam’s expanded SureBackup capabilities test and verify the recoverability of every backup of every virtual machine

Read more...
Blueprint your IPMS - Part 2
May 2010, Integrated Solutions
The March 2010 edition of Hi-Tech Security Solutions featured Part 1 on Blueprinting your Integrated People Management Solutions (IPMS). Part 2 follows. In the March article, it was highlighted that ...

Read more...
Magix boosts enterprise data protection
May 2010
Magix Integration has announced it has obtained the rights to supply the Varonis range of data protection and preservation products. Varonis protects corporate data while making it easily available to ...

Read more...
iPad users targeted by backdoor dissembled as iTunes update
May 2010
An e-mail invitation to an iTunes update gets iPad users’ PCs into backdoor trouble.  Success stories are cybercriminals’ go to sources of victims and the iPad craze could not have been left out of ...

Read more...
Extremely aggressive worm chokes instant messaging
May 2010
New variant of Palevo blasts unprotected systems via fake photo gallery links. The latest offspring of the Palevo family has begun spreading these days via a massive wave of automatically generated IM ...

Read more...
Top five e-threats – April 2010
May 2010
April’s top brings forward two newcomers: a fake AV and a Trojan.Keygen! April is the third month in a row in which Trojan.AutorunInf.Gen is the top e-threat with 13,21% of the total amount of the global ...

Read more...
On-line shopping for Mother’s Day
May 2010
Husbands and teenage children need to pay great attention to on-line transactions of all kinds According to an independent research conducted by Dept Information System, University of Cape Town “the ...

Read more...
Windows 7 compatibility checker turns out to be a Trojan
May 2010
A deceptive 'help' message invites recipients to check their PCs’ compatibility with Windows 7 by downloading and running an altered version of Windows 7 Upgrade Advisor concealing a Trojan. Cybercriminals ...

Read more...
Malware-loaded spam waves generously wash the shores of Facebook and MySpace
28 April 2010
These are twin campaigns born under the same theme: an alleged password change

Read more...
Network and data security remains a top concern
28 April 2010
It is imperative that organisations adopt an holistic approach that encompasses security right from the core to the perimeter of the network

Read more...
Information must be protected
April 2010
Hi-Tech Security Solutions spoke to five experts in the data protection field to find out what companies should be doing to protect their data

Read more...
A byte of compliance
April 2010
Protecting sensitive information today is part of the whole process of securing companies’ IT infrastructures. Unfortunately, with the myriad threats facing companies from external and internal sources, ...

Read more...



<< First   < Previous   Page 69 of 87   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.