Security News - Page 12

Unhackable Telecom Networks Come A Step Closer

Unhackable Telecom Networks Come A Step Closer

.

Researchers have come up with a way of protecting telecoms networks using quantum cryptography without the need for expensive dedicated optical fibre links.

Ransomware Will Be The Premiere Cybercrime Strategy In 2013

Ransomware Will Be The Premiere Cybercrime Strategy In 2013

.

Ramsomware goes beyond attempting to fool its victims; it attempts to intimidate and bully them.

McAfee Threats Report Shows Global Expansion Of Cybercrime

McAfee Threats Report Shows Global Expansion Of Cybercrime

.

Report explores evolution of ransomware, shows malware topping 100 million samples and finds database breaches at all-time high.

Seven Cybersecurity Predictions For 2013

Seven Cybersecurity Predictions For 2013

.

Malicious mobile apps, government-sponsored attacks and sandbox avoidance expected.

Adobe Says User Forum Was Breached, Takes Site Offline

Adobe Says User Forum Was Breached, Takes Site Offline

.

Adobe said its Connect web conferencing service and other company sites were not breached.

23% Users Still Run Outdated Web Browsers; Compromise Online Security

23% Users Still Run Outdated Web Browsers; Compromise Online Security

.

Using anonymous data collected from the cloud-based Kaspersky Security Network, Kaspersky Lab analysed web browser usage patterns of its millions of customers around the world.

SEC Left Computers Vulnerable To Cyber Attacks: Sources

SEC Left Computers Vulnerable To Cyber Attacks: Sources

.

While the computers were unprotected, there was no evidence that hacking or spying on the SEC's computers took place.

BYOD On Rise, But Only 11% Cos Use MDM

BYOD On Rise, But Only 11% Cos Use MDM

.

33% of companies allow their staff unrestricted access to corporate resources from their smartphones.

Tight Vendor Contracts Can Stifle Growth

Tight Vendor Contracts Can Stifle Growth

.

Somesh Singh, VP - Engineering, NetIQ says that vendor contracts should be flexible and agile so that it allows for CIOs to respond and adopt new and emerging trends.

APAC Network Security Mkt To Reach $3.31 Bn In 2017

APAC Network Security Mkt To Reach $3.31 Bn In 2017

.

Maturing customer mindsets broaden scope of network security market in APAC, finds Frost & Sullivan.

33% Cos Have Not Fully Implemented Anti-Malware Protection

33% Cos Have Not Fully Implemented Anti-Malware Protection

.

Antivirus software protects the whole infrastructure of 67 percent of companies. The remaining third introduce this kind of solution only for key nodes of the corporate network.

Malware Targeting Android Gingerbread And Ice Cream Sandwich

Malware Targeting Android Gingerbread And Ice Cream Sandwich

.

Gingerbread was released back in 2011, but due to the Android device market segmentation it still remains one of the most popular versions, which, in turn, attracts increased interest from cybercriminals.

Kaspersky Lab Examines IT Threat Evolution In Q312

Kaspersky Lab Examines IT Threat Evolution In Q312

.

Microsoft no longer features among the top 10 products with vulnerabilities.

Cos Addressing Only Short-Term InfoSec Threats: E&Y

Cos Addressing Only Short-Term InfoSec Threats: E&Y

.

Organisations need to fundamentally shift their approach to information security in order to meet the threats presented by existing and emerging technologies according to Ernst & Young.

Taking On InfoSec In 2013

Taking On InfoSec In 2013

.

Jay Gardner, President & General Manager, NetIQ says that the combination of security, identity management and good quality service delivery is the key to InfoSec in the coming year.

DRDO, PM's Adviser Websites Come Under Cyber Attack

DRDO, PM's Adviser Websites Come Under Cyber Attack

.

"After checking the websites, these were restored," a source said, adding that the information contained by these websites is already in the public domain.

Cyber Security Perspectives

Cyber Security Perspectives

.

21st century technology and security - a difficult marriage.

Bitdefender Reinforces Java Exploit Malware Detection

Bitdefender Reinforces Java Exploit Malware Detection

.

Bitdefender Java.Exploit.CVE-2012-4681.F detection instantly blocks the applets, making the malware impossible to be installed on users' devices.

ArrayShield Wins NASSCOM Emerge 50 2012 Award

ArrayShield Wins NASSCOM Emerge 50 2012 Award

.

ArrayShield has been awarded for the EMERGE Startup Category.

EMC To Acquire Security Software Provider Silver Tail Systems

EMC To Acquire Security Software Provider Silver Tail Systems

.

Silver Tail will operate within the RSA security division and is expected to extend the capabilities of RSA's Identity Protection and Verification solutions.

InfoSec: Not Just CIO’s Headache, But CEO’s Too

InfoSec: Not Just CIO’s Headache, But CEO’s Too

.

Naveen Hegde, Senior Market Analyst, Software Research – IDC APAC talks about how key InfoSec concerns are now making their way into the CEO’s domain as well.

McAfee Announces Advancements In Endpoint Security Products

McAfee Announces Advancements In Endpoint Security Products

.

New solutions include user-centric dynamic white-listing, day-zero intrusion prevention of master boot records, secure containers for mobile devices, and encrypted remote management.

Xerox, McAfee Reveal New Protection Against Malware

Xerox, McAfee Reveal New Protection Against Malware

.

Xerox and McAfee revealed new protection against malware and viruses with the first networked multifunction printer to use McAfee Embedded Control software.

Apple Drops Java After Experts Warn Mac Users On Its Security

Apple Drops Java After Experts Warn Mac Users On Its Security

.

Apple is implementing this change in the wake of a Java security scare that prompted some security experts to caution computer users to only use Java on an as-needed basis.

HP Announces ArcSight Enterprise Security Manager 6.0c

HP Announces ArcSight Enterprise Security Manager 6.0c

.

The scalable security monitoring and compliance solution to help clients identify and remediate cyber threats faster.

Kaspersky Plans Software For Securing Nuclear Plants

Kaspersky Plans Software For Securing Nuclear Plants

.

Kaspersky Lab is developing a secure operating system to run computers inside nuclear power plants and other vital infrastructure and industrial plants.

Work Email The Number One Source of Government Data Leaks

Work Email The Number One Source of Government Data Leaks

.

Agencies may be providing the tools by which Federal workers are leaking critical information.

IT Supply Chain Integrity To Be Major Security Concern By 2017

IT Supply Chain Integrity To Be Major Security Concern By 2017

.

By 2017, IT supply chain integrity will be identified as one of the top three security-related concerns by global IT leaders, says Gartner.

McAfee Launches New DC Security Suites

McAfee Launches New DC Security Suites

.

Solutions to address security challenges for datacentres in the physical, virtual and cloud environments.

India To Set Up Cyber Security Panel

India To Set Up Cyber Security Panel

.

National Security Advisor Shivshankar Menon said that a Joint Working Group on cyber security will be set up.