Information Security



BitDefender offers a free tool that completely removes the Conficker/Downadup worm from home and business networks
April 2009
Demonstration of the removal tool available on YouTube. BitDefender, an award-winning provider of innovative anti-malware security solutions, has launched a free tool that removes all versions of the ...

Read more...
BitDefender offers a free tool that completely removes the Conficker/Downadup worm from home and business networks
March 2009
Demonstration of the removal tool available on YouTube. BitDefender, an award-winning provider of innovative anti-malware security solutions, has launched a free tool that removes all versions of the ...

Read more...
Mobility - a security conundrum?
April 2009
The security challenges of wireless communications can be effectively overcome when existing security standards are implemented. Mobility is no longer a luxury but an entrenched part of everyday living. ...

Read more...
Free server surveillance
April 2009
Free server protection software offered to all South African companies. To help reduce the threat against vulnerable and dispersed server infrastructures, Magix Integration has announced the local availability ...

Read more...
Quickscan beta to provide second opinion on PC security
March 2009
Offers users a quick and easy check for running threats. BitDefender, a global provider of award-winning antivirus software and data security solutions, today announced the availability of the beta version ...

Read more...
Teaching old worms new tricks
March 2009
Win32.Worm.Downadup uses new tricks to spread itself without being easily detected. Win32.Worm.Downadup, a worm which spreads by exploiting a vulnerability in the Windows RPC Server Service, has been ...

Read more...
BitDefender first to offer free tool which disinfects all versions of Downadup
March 2009
New Variant of Downadup worm aggressively spreading throughout Web, according to BitDefender Labs. On Saturday, 7 March, BitDefender, an award-winning provider of innovative anti-malware security solutions, ...

Read more...
Quantum cryptography secures networks
February 2009
In a development that will enable entities such as companies or banks to securely encrypt their communications with data transmission that is absolutely impervious to interception, several partners have ...

Read more...
Unpacking the compression toolbox
February 2009
It is probably fair to say that few buyers of video security systems are experts in video encoding. In reality, what is important is to be able to recognise good encoding when you see it. It is probably ...

Read more...
BitDefender E-Threats Landscape Report spotlights Trojans as dominant security menace in 2008
February 2009
 Anti-virus leader predicts stealth and automation will be major concerns in 2009. More than 80% of malware distributed worldwide in 2008 consisted of Trojans according to the E-Threats Landscape Report, ...

Read more...
Step by step toward an IAM solution
January 2009
Today, businesses and government agencies not only process data internally, they need to exchange data with external partners as well. To do so they must open their IT systems to customers and partners. ...

Read more...
Pre-empt, prepare, prevent
November 2008, Elvey Security Technologies
We have to be very aware of global, local and virtual trends and realities in order to pre-empt what might happen, to be prepared for possible radical change and prevent the impact on us

Read more...
Common myths, misconceptions and paranoia about information security
November 2008
As organisations embark on an information security management programme, they encounter a threat landscape that contains both real and perceived obstacles that distract them from business priorities, ...

Read more...
How much is your laptop really worth?
October 2008
When you lose a laptop due to theft or for any other reason, the hardware is the least of your worries, the real worry is what happens to the data on the device

Read more...
Flexible and reliable wireless technology
October 2008
Wireless security systems are designed to provide convenience, flexibility, reliability and also to reduce cost significantly. These wireless systems have taken the security industry by storm, as they ...

Read more...
Protecting information is not optional
September 2008
Horror stories of companies carelessly losing thousands or even millions of records containing customers’ credit card information will soon be a thing of the past. A new compliance standard, designed ...

Read more...
Protect mobile information
September 2008
In today’s technology-driven world it is amazing how many people do not take the steps to protect their information. Especially, when the information is mobile. It is evident that people finally understand ...

Read more...
Managing the process to reap IP rewards
May 2008, Reditron
The focus should be on continuous development of applications that are fast and effective within a clear business framework.

Read more...
Bridging the gap
March 2008, G2 Fire
Lenel Systems International and Bioscrypt have been tightly integrating their products to provide organisations with a converged security solution that unifies physical and logical security, giving companies the ability to create a single unified identity platform.

Read more...
FxSecure Key
March 2008
FxSecure Key from RCG Systems SA is an anti-theft wireless card that provides fast Internet connectivity of up to 7,2 Mbps and also safeguards notebooks and data. It protects confidential data in the ...

Read more...



<< First   < Previous   Page 71 of 85   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.