Storage Foundation HA for Windows to provide business continuity through Windows Azure from Microsoft.
Kaspersky Lab researchers have since found that part of the Flame program code is nearly identical to code found in a 2009 version of Stuxnet.
LinkedIn says it has finished disabling all affected accounts and does not believe other members are at risk.
Symantec is simplifying its SME product portfolio to make it easier to buy, set-up, manage and receive support for Symantec products.
The company sent affected members emails explaining how to change their passwords.
With reports of 6.4 million user passwords being stolen, Websense Security Labs lists out some recommendations for users.
Increases in mobile exploits and concerns from security executives around BYOD adoption leads to enhanced security intelligence capabilities.
Stonesoft, the network security provider, shares insights for overcoming IPv6 security challenges.
LinkedIn engineer Vicente Silveira confirmed on the website's blog that some passwords were "compromised."
Hackers who built Flame exploited a flaw in Windows that allowed them to trick PCs into believing it was a legitimate piece of software from Microsoft.
Kaspersky Lab's analysis of the malware revealed that it was currently being used for cyber-espionage and it would infect computers to steal data and sensitive information.
Manish Dave, CISO, Essar Group, talks about the various IT security challenges faced by enterprises today and highlights the importance of independent vulnerability assessment for organisations.
McAfee study found that 83% of consumers had working basic security protection, and 17% of PCs scanned either had no anti-virus installed or was disabled.
New software offers improved protection, simplified management and increased scalability.
Four editions of XTMv are being launched to meet the needs of small, midsize and large-scale distributed environments.
The primary function of Flame is to collect and upload information.
Unfortunately, when hackers have an end -to-end business process view of the enterprise, the CISO's office is still living by the siloed approach explains Tom Scholtz, VP Distinguished Analyst, Gartner.
60% of cos expected to implement formal programs for monitoring external social media for security breaches and incidents by 2015.
Application makes iPads, iPhones safer for collaboration and BYOD.
It has about 100 times as much code as a typical virus designed to steal financial information, says Kaspersky Lab researcher.
50% of all phishing attacks in April were on brands present in US, UK, Australia and India, finds RSA report.
Announces new EMC Data Domain and EMC Avamar deduplication systems and software.
The agency has asked users to deploy adequate security systems to deal with attacks originating through DDoS.
The security-testing program provides peace of mind to the carriers whose networks link to millions of smart devices, and to the enterprise users of those devices.
25 percent bot-infections in India found in small and emerging cities, says Symantec.
8 million new malicious software samples have been detected since January 2012 due to unrelenting spammers and hackers.
Revenue for financial performance, strategy management and GRC applications market grew 16.3% in 2011.
A challenge for CIOs/CISOs, especially in the banking sector, is to strike the balance between security and ease of transaction, believes Ajay Misra, GM - IT, Punjab National Bank.
InfoWatch unveils the results of their annual global study of confidential data leaks.