Earlier in the year Google disclosed that the company, along with at least twenty other large companies from a variety of industries, were victims of cyber attacks.
Hi, what are you looking for?
Earlier in the year Google disclosed that the company, along with at least twenty other large companies from a variety of industries, were victims of cyber attacks.
Top 10 Malware Threats - May, 2010Security software company, Sunbelt Software, in its monthly malware threat report, today announced the top 10 most prevalent malware threats detected in May 2010.
San Jose, CA based SonicWALL, Inc. (NASDAQ:SNWL), a provider of IT security and data solutions, today announced it has entered into a definitive agreement to be acquired by an investor group led by Thoma Bravo, LLC and the Ontario Teachers' Pension Plan (Teachers' Private Capital) in a transaction valued at approximately $717 million.
Log management and security company, LogLogic, today released a preview of its upcoming log management virtual appliances. The LogLogic Log Management Virtual Appliance is a virtual log management solution, offering enterprise-grade log data collection, search and storage capabilities for companies seeking to improve business operations, enhance security and meet compliance requirements. The virtual appliances operate on VMWare’s ESX virtual servers as well as on devices running VMWare WorkStation, and VMWare Player.
Recent cyber attacks on government and private sector businesses along with the rapid proliferation of malware such as Conficker and Zeus, have shown how attackers are utilizing multiple attack types and vectors to disrupt business and steal sensitive data.
Security software company, Sunbelt Software, today announced the availability of VIPRE Enterprise for Mac, client software that provides virus protection against Macintosh-specific malicious threats.With VIPRE Enterprise for Mac, users will be able to run both scheduled and on-demand scans and view quarantine and scan history. In addition to protecting against MacOS specific threats, the product will also be able to detect and clean any Windows-specific threats discovered on a Mac system.
Next to anonymity, automation is a cybercriminal’s best friend. Botnets—a network of compromised computers on the Internet under the command and control of a single computer—are a game-changer for e-fraudsters. Cybercriminals with a sufficiently large botnet have the potential computing power equivalent to a supercomputer at their disposal.
As the days lead up to the start of the 2010 World Cup, cybercriminals are busy drafting new scams and tactics to take advantage of the excitement surrounding the global event. The latest scam involves an email saying telling users that their email address has won an award of a large sum of money and a free ticket and hotel in South Africa. An example of the fraudulent email is below:
• Internet portal offers bots designed for various activities at prices ranging from $95 to $225; entire catalog of bots costs $4,500 • Creators claim that all bots are undetectable, as they randomly change users, agents and headers; also include automated CAPTCHA generators
Mountain View, CA based software solutions company, SpikeSource, this week announced the availability of spikeInsight, an on-demand tool designed to help build, fix, and maintain Windows and Linux applications.
IBM (NYSE:IBM) today announced the official opening of a new global security operations center in Bangalore, India.The new security center, staffed with managed security services professionals and members of the X-Force security research and development team, will help support IBM’s more than 4,000 managed security services clients worldwide.
An online survey of over 250 security professionals revealed that forty-seven percent of IT security professionals believe that security audit costs will increase in 2010.The survey, conducted by nCircle, a security and compliance solutions provider, covered a range of security topics including smartphones, healthcare, cloud computing and social media.Key findings from the survey include:• 45% of respondents anticipate no change in 2010 security audit costs
Security and data protection for mobile devices, smart devices and new DNS Service extends user protection to an ever growing list of connected devices
While companies increasingly rely on social media for business marketing, support, and collaboration, they often ignore the associated risks such as non-compliance, data loss and legal issues.
While companies increasingly rely on social media for business marketing, support and collaboration, they often ignore the associated risks such as non-compliance, data loss and legal issues. Autonomy Corporation, an enterprise software company with dual headquarters in Cambridge, United Kingdom and San Francisco, CA, hopes to help organizations manage these risks. Autonomy today announced the availability of “Autonomy Social Media Governance,” a solution designed to monitor, govern, and protect organizations with employees engaging on social media sites.
In an effort to extend its offerings in the mobile space, McAfee, Inc. (NYSE:MFE) today announced that it has entered into a definitive agreement to acquire Trust Digital, a privately held provider of enterprise mobility management and security software.