Security News - Page 11
Verizon's Data Breach Predictions For 2013
The most likely threats involve authentication attacks and failures, continued espionage and "hacktivism" attacks, web application exploits and social engineering.
Websense Named Leader In IDC MarketScape: Worldwide Web Security Products
The report cites "the tight integration among Web security, messaging security and data loss prevention (DLP)" as "another strength of the Websense TRITON architecture."
Blue Coat To Acquire Crossbeam Systems
By acquiring Crossbeam, Blue Coat is laying the foundation for a broader strategy to transform the way businesses secure and optimise their networks.
Cybercrime To Go Mobile And Social in 2013
According to the Norton Cybercrime Report 2012, in India, it is estimated that more than 42 million people fell victim to cybercrime in the past twelve months.
Check Point And Versafe Uncover New Eurograbber Attack
The case study uncovers a highly sophisticated attack used to steal millions from corporate and private banking customers across Europe.

BYOD And Virtualisation Among Top Data Recovery Challenges In 2012
Kroll Ontrack experienced an influx in mobile device data recovery requests in 2012 - in line with the bring your own device (BYOD) to work trend.
Banks Fend Off Attacks Designed To Disrupt Online Banking Access
Bank of America Corp, JPMorgan Chase & Co and U.S. Bancorp and other major U.S. banks seem to have stopped a group of hacker activists from seriously disrupting their online banking operations.
DSCI Assessment Frameworks for Security And Privacy Released
The frameworks have been developed to assess the maturity of practices deployed by organisations in security and privacy.
Trend Micro Releases Security Predictions For 2013 & Beyond
The most serious threat during 2013 may be malicious and high-risk Android apps. Trend predicts they will reach 1 million in 2013, up from 350,000 at the end of 2012.
Veracode Certifies Infor LN For Application Security And Risk Management
This certification demonstrates Infor's ongoing commitment to security in order to help mitigate customers' risk in areas such as: reputation damage, financial loss, etc.
ArrayShield Provides Two Factor Authentication For Virtualisation
All top virtualisation products like Citrix XenDesktop and XenApp, VMware View Virtual Desktop and Microsoft Hypervisor etc. can be integrated with ArrayShield's IDAS Two Factor Authentication.
India Dominates Global Spam Scene: Report
India has shown nearly continuous growth and now dominates the scene by a large margin, sending out nearly 16% of all spam finds IBM report.
Evolving Cyber Threats Draw Investments Into Secure Content Mgmt Mkt
New analysis from Frost & Sullivan, finds that the secure content management market earned revenues of over $570.6 million in 2011 and estimates this to reach $1,787.8 million in 2018.
Kaspersky Lab Detects 200,000 New Malicious Programs Every Day
Kaspersky Lab released its annual Kaspersky Security Bulletin, which provides the overall malware and cyber-threat statistics for 2012.
Businesses Embracing Encryption To Protect Sensitive Data
Encryption is the fifth most widespread protection technique - a sharp rise from the results of a similar survey in 2011 where it barely crept into the top 10.
Duplicate Info Aggravating "Information Mayhem" In Indian Businesses
Lack of information governance results in 78% of businesses in India missing compliance requirements, says Symantec survey.
Check Point Annouces ThreatCloud Security Services
Services monitor events directly on customer security gateways, and are powered by Check Point's ThreatCloud security intelligence infrastructure.
Key Security Predictions For 2013: Kaspersky Lab
Notable predictions for the 2013 include the continued rise of targeted attacks, cyber-espionage and nation-state cyber-attacks, among others.
91% Of Targeted Attacks Derived From Spear Phishing Emails
New threat research released by Trend Micro gives empirical evidence that an aggressive breed of phishing attacks is well underway; more than ever, companies need better threat detection capability.
80% Businesses Confident About Their Security Behaviour: PwC
The PwC survey also finds there is a lag reported in the security strategy around new technologies including mobile devices, cloud and social media.
New Strategies Against Advanced Cyber Threats: Frost & Sullivan
Frost & Sullivan identifies what you need to know to protect your intellectual property and prepare for unexpected data breaches.
Websense Unveils ACE In The Cloud For TRITON
Cloud-based solution adds critical security layer with proven, real-time advanced threat and malware defences.

80% Of Malware Attacks In 2012 Were Redirects From Legitimate Sites
Sophos Threat Report outlines the changing threats and new platforms challenging IT security.
People And Policy: Building Blocks Of Enterprise Security
Rob Forsyth, Director, APAC, Sophos establishes how people can be the weakest security link and how this can be tackled in the security policy. He also elaborates on security in the cloud.
Data Protection, Infra Security Top IT Priorities: Survey
Preventing cybercriminals from infiltrating the corporate network was highlighted by 31 percent of companies surveyed by Kaspersky.
ArrayShield Provides Two Factor Authentication For Office 365
Integrating ArrayShield's technology with Microsoft's ADFS will provide more secure,Two Factor Authentication for a range of corporate networks and cloud services.

Spam Flow Falls, But Poses Greater Danger: Kaspersky
Compared to the previous quarter, the volume of spam traffic in Q3 2012 decreased by 2.8 percentage points and averaged 71.5 percent.
50% Cos Globally Lack Awareness Of Cyber Threats: Survey
Around half of companies globally are unaware of and don't take effective measures against, the most pressing cyber threats that exist today, finds Kaspersky Lab survey.
INC Research Selects MetricStream To Strengthen Compliance Mgmt
MetricStream's Audit Management and CAPA Management Solutions enhance INC Research's compliance with quality assurance standards, regulations and internal policies.
Businesses Bracing For Security, Productivity Impact On Cyber Monday
68 percent of all businesses reported that employees cannot identify fraudulent attacks on the corporate network, says Dell SonicWALL survey.