Researchers have come up with a way of protecting telecoms networks using quantum cryptography without the need for expensive dedicated optical fibre links.
Ramsomware goes beyond attempting to fool its victims; it attempts to intimidate and bully them.
Report explores evolution of ransomware, shows malware topping 100 million samples and finds database breaches at all-time high.
Malicious mobile apps, government-sponsored attacks and sandbox avoidance expected.
Adobe said its Connect web conferencing service and other company sites were not breached.
Using anonymous data collected from the cloud-based Kaspersky Security Network, Kaspersky Lab analysed web browser usage patterns of its millions of customers around the world.
While the computers were unprotected, there was no evidence that hacking or spying on the SEC's computers took place.
33% of companies allow their staff unrestricted access to corporate resources from their smartphones.
Somesh Singh, VP - Engineering, NetIQ says that vendor contracts should be flexible and agile so that it allows for CIOs to respond and adopt new and emerging trends.
Maturing customer mindsets broaden scope of network security market in APAC, finds Frost & Sullivan.
Antivirus software protects the whole infrastructure of 67 percent of companies. The remaining third introduce this kind of solution only for key nodes of the corporate network.
Gingerbread was released back in 2011, but due to the Android device market segmentation it still remains one of the most popular versions, which, in turn, attracts increased interest from cybercriminals.
Microsoft no longer features among the top 10 products with vulnerabilities.
Organisations need to fundamentally shift their approach to information security in order to meet the threats presented by existing and emerging technologies according to Ernst & Young.
Jay Gardner, President & General Manager, NetIQ says that the combination of security, identity management and good quality service delivery is the key to InfoSec in the coming year.
"After checking the websites, these were restored," a source said, adding that the information contained by these websites is already in the public domain.
Bitdefender Java.Exploit.CVE-2012-4681.F detection instantly blocks the applets, making the malware impossible to be installed on users' devices.
ArrayShield has been awarded for the EMERGE Startup Category.
Silver Tail will operate within the RSA security division and is expected to extend the capabilities of RSA's Identity Protection and Verification solutions.
Naveen Hegde, Senior Market Analyst, Software Research – IDC APAC talks about how key InfoSec concerns are now making their way into the CEO’s domain as well.
New solutions include user-centric dynamic white-listing, day-zero intrusion prevention of master boot records, secure containers for mobile devices, and encrypted remote management.
Xerox and McAfee revealed new protection against malware and viruses with the first networked multifunction printer to use McAfee Embedded Control software.
Apple is implementing this change in the wake of a Java security scare that prompted some security experts to caution computer users to only use Java on an as-needed basis.
The scalable security monitoring and compliance solution to help clients identify and remediate cyber threats faster.
Kaspersky Lab is developing a secure operating system to run computers inside nuclear power plants and other vital infrastructure and industrial plants.
Agencies may be providing the tools by which Federal workers are leaking critical information.
By 2017, IT supply chain integrity will be identified as one of the top three security-related concerns by global IT leaders, says Gartner.
Solutions to address security challenges for datacentres in the physical, virtual and cloud environments.
National Security Advisor Shivshankar Menon said that a Joint Working Group on cyber security will be set up.