Signature Based Anti-Virus Test Results - Vendors Struggle to Keep up with ThreatsThe most popular signature-based antivirus (AV) solutions detect on average less than...
Hi, what are you looking for?
Signature Based Anti-Virus Test Results - Vendors Struggle to Keep up with ThreatsThe most popular signature-based antivirus (AV) solutions detect on average less than...
Jailbroken iPhones - a Risk in the EnterpriseLast week’s ruling by the Library of Congress's Copyright Office giving a legal green light to iPhone...
"Mariposa botnet" - Butterfly botnet kit Author Arrested“Iserdo,” the confirmed author of the Butterfly botnet kit, was arrested recently in Maribor, Slovenia, by Slovenian authorities...
Using Graphics Cards for Password Cracking - Software Breaks Encryption up to 45x Faster
Microsoft this week announced an agreement to collaborate with Adobe systems and facilitate advanced information sharing on vulnerabilities via its Microsoft Active Protections Program...
CA Technologies (NASDAQ:CA) today announced that its identity and access management (IAM) technology now supports the Google Apps™ suite, which includes the familiar and...
A shocking 87 percent of the victims in a study of data breaches jointly conducted by Verizon and the U.S. Secret Service had evidence...
Cisco Global Threat Report - 2Q10For the first time since tracking began in 2007, the number of unique web-based malware hosts and malware URLs...
Fifty-six percent of companies that have deployed interactive Web 2.0 applications have taken steps to prevent hacking, and the other 46 percent should, according...
In a trend that mirrors the invasion of the corporate world in the 1980’s by personal computers, today’s employees are beginning to use consumer-oriented...
Malware prevention provider FireEye and network forensics company Solera have announced a technology partnership to deliver an integrated security solution that will not only...
McAfee today announced a Risk Management solution the company claims will help organizations maximize their IT security spending by correlating actual risks with current...