Setting up of a super monitoring nodal agency to exclusively look after the cyber security of the nation should be considered, say NGO Cyber Society of India officials.
Gauss is focused on stealing login credentials for eBanking, social networking and email services.
Q-Cloud provides backup of both physical and virtual infrastructures for capacities ranging from 1 TB up to 1 PB of data.
In ArrayShield IDAS, the character array shown for each transaction is unique and the One-Time-Secret Code derived by the user is valid only for that transaction.
Researchers have identified code that attacks machines by exploiting a newly discovered flaw in the latest version of Java.
Trend Micro Mobile Security 8.0 upgrades MDM to meet growing mobile enterprise security demands in APAC.
Sanovi DRM for Banking helps banks comply with statutory regulations.
Aviva shares key elements of its tryst with DLP as it helps the insurance major ensure privacy and security of its data
In the light of major information breach events at large corporations, Vishal Salvi, CISO, Sr VP, HDFC Bank discusses strategies to remediate them.
Quest and Quantum are collaborating to deliver joint solutions that reduce redundant data storage during the backup and DR process.
The malicious email itself is a copy and paste of a legitimate email from BlackBerry.
A.K. Antony responded to queries from members amidst regular security alerts that Indian defence establishment is under a constant attack by hackers, reportedly based in China.
OSX.Crisis is an advanced threat not only in function, but also in the way it spreads, warns Symantec.
60% Indian businesses are struggling to effectively manage and protect their digital information, reveals Symantec.
ICICI, Karur Vysya and South Indian Bank earn award for managing IT risk.
Call Cheater Lite, a privacy-infringing application, may unnecessarily charge international SMS charges to the user, finds Symantec.
The latest version provides a simple way to bring BYOD into the enterprise-quickly, safely and securely, all while reducing the reliance upon IT.
Verint will buy back Comverse Technology's 41 percent stake following the spin off and the sale of Starhome, eliminating the current holding company structure.
Researchers have developed an algorithm that could help investigators, find the source of a crime or otherwise, as long as a network is involved.
Trend Micro enhances its cloud-security infrastructure for superior cloud, mobile and targeted attack protection.
Dubbed Gauss, the virus may also be capable of attacking critical infrastructure and was built in the same laboratories as Stuxnet.
Mobile security solution combines web, data and mobile security with MDM features for BYOD and corporate devices.
Kaspersky Lab has been listed as a Top Player in the Market Quadrant for Endpoint Security Platforms 2012 by The Radicati Group.
Enhancements also include new offerings to secure data from backup to expiration.
Whitelisting protects from unwanted intrusions by permitting only applications and executable files that are considered safe.
A Quest Software survey indicates that nearly three-quarters of organisations now rank restoring critical applications alongside recovering lost data as their top data protection concern.
New Acunetix service now integrates Bitdefender to instantly detect malware and allows for easy removal.
Study reveals that 73 percent of online fraud attacks result in the successful transfer of money.
New class of network security appliance to help control social media and web browsing risks.
One compromised account belonged to a Dropbox employee, and contained a document containing the email addresses of Dropbox users.