Information Security



iPad users targeted by backdoor dissembled as iTunes update
May 2010
An e-mail invitation to an iTunes update gets iPad users’ PCs into backdoor trouble.  Success stories are cybercriminals’ go to sources of victims and the iPad craze could not have been left out of ...

Read more...
Extremely aggressive worm chokes instant messaging
May 2010
New variant of Palevo blasts unprotected systems via fake photo gallery links. The latest offspring of the Palevo family has begun spreading these days via a massive wave of automatically generated IM ...

Read more...
Top five e-threats – April 2010
May 2010
April’s top brings forward two newcomers: a fake AV and a Trojan.Keygen! April is the third month in a row in which Trojan.AutorunInf.Gen is the top e-threat with 13,21% of the total amount of the global ...

Read more...
On-line shopping for Mother’s Day
May 2010
Husbands and teenage children need to pay great attention to on-line transactions of all kinds According to an independent research conducted by Dept Information System, University of Cape Town “the ...

Read more...
Windows 7 compatibility checker turns out to be a Trojan
May 2010
A deceptive 'help' message invites recipients to check their PCs’ compatibility with Windows 7 by downloading and running an altered version of Windows 7 Upgrade Advisor concealing a Trojan. Cybercriminals ...

Read more...
Malware-loaded spam waves generously wash the shores of Facebook and MySpace
28 April 2010
These are twin campaigns born under the same theme: an alleged password change

Read more...
Network and data security remains a top concern
28 April 2010
It is imperative that organisations adopt an holistic approach that encompasses security right from the core to the perimeter of the network

Read more...
Information must be protected
April 2010
Hi-Tech Security Solutions spoke to five experts in the data protection field to find out what companies should be doing to protect their data

Read more...
A byte of compliance
April 2010
Protecting sensitive information today is part of the whole process of securing companies’ IT infrastructures. Unfortunately, with the myriad threats facing companies from external and internal sources, ...

Read more...
Audio steganography
April 2010
In the past decade, steganography, or the art of concealing information within seemingly innocuous digital platforms and carriers, has emerged into a hot area of research. This is due to its increasing ...

Read more...
Does an employee’s financial position affect the value of company data?
30 March 2010, iFacts
Internationally it is known that at least 60% of employees leaving an organisation take company information with them for various reasons

Read more...
Bandwidth and storage considerations
March 2010, Axis Communications SA
The factors include the number of cameras, the image resolution used, the compression type and ratio, frame rates and scene complexity

Read more...
Blueprint your IPMS
March 2010, Integrated Solutions
The most common mistake companies make before embarking on a technology implementation or modernisation project is to solicit bids from vendors prior to developing a blueprint or requirements specification. ...

Read more...
Condyn adds to its arsenal
March 2010
Condyn has expanded its IT security distribution network with the addition of Trend Micro and McAfee. Trend Micro has appointed information security solution provider, Condyn, as a distributer for the ...

Read more...
HP strengthens security capabilities
March 2010
New security services and solutions from HP address security from the printer to the cloud. HP has introduced a security services portfolio and new solutions that offer increased vulnerability assessment, ...

Read more...
Terabyte network overview
March 2010
Cyberoam delivers a comprehensive view of all network devices, data redundancy. Cyberoam iView, the open source logging and reporting solution is now available in appliance form, delivering a cost-effective ...

Read more...
BitDefender's top e-threats
26 February 2010
People’s constant need to interact makes them targets for all sorts of malicious software

Read more...
Comodo Dragon protects online privacy
26 February 2010
With Comodo Dragon, information about online exploration stays as much as possible within the user's PC

Read more...
Giesecke & Devrient and ARM protect mobile applications from data theft
26 February 2010
Through the combination of ARM TrustZone technology sensitive applications such as electronic payment and online banking via mobile phone will be efficiently protected from security threats

Read more...
Network threats are evolving
February 2010
To protect against the increasing sophistication of network security threats, enterprises must work diligently to adopt a comprehensive security solution. Enterprise LAN and security professionals face ...

Read more...



<< First   < Previous   Page 68 of 85   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.