Security News - Page 22

Novell Unveils Novell ZENworks 11 Support Pack 2

Novell Unveils Novell ZENworks 11 Support Pack 2

.

Solution secures devices, supports compliance with flexible Full Disk Encryption and adds support for Mac.

Malware Surpassed 75 Million Samples In 2011: McAfee

Malware Surpassed 75 Million Samples In 2011: McAfee

.

McAfee Q4 Threats Report shows Malicious sites nearly double, while mobile malware continues to grow.

Aruba Networks Unveils BYOD Security Solution

Aruba Networks Unveils BYOD Security Solution

.

To secure iOS, Android, Mac OS X and Windows 7 mobile devices on any network.

Andhra Government Websites Hacked

Andhra Government Websites Hacked

.

As many as 27 websites of various departments of Andhra Pradesh were hacked, exposing the chinks in the state's cyber security.

Google Android Malware Jumped Over 3325% In 2011

Google Android Malware Jumped Over 3325% In 2011

.

Juniper Networks releases findings from its 2011 Mobile Threats Report.

Symantec Unveils GRC Solution

Symantec Unveils GRC Solution

.

Symantec Control Compliance Suite allows security leaders create a targeted view of IT risk as it relates to a specific business process, group or function.

Websense Unveils X10G: Scalable Solution To Malware, DLP

Websense Unveils X10G: Scalable Solution To Malware, DLP

.

Solution provides real-time web and data security on a scalable modular chassis with 10G interfaces for up to 100,000 users.

Iran Has 'Neutralised' Stuxnet Virus: Experts

Iran Has 'Neutralised' Stuxnet Virus: Experts

.

The malicious code, whose precise origin and authorship remain unconfirmed, made its way as early as 2009.

In 2012, Get Smart About Endpoint Security

In 2012, Get Smart About Endpoint Security

.

With the entry of multiple consumer devices into the previously standardised enterprise IT network, employees can work from everywhere - leading to an explosion of endpoints in the network.

GRC - The Indian Scenario

GRC - The Indian Scenario

.

Sameer Shelke, Co-founder, COO and CTO, Aujas Networks discusses the level of adoption of GRC tools in Indian companies.

Lessons From Major Breach Events In 2011

Lessons From Major Breach Events In 2011

.

Dr. Whitfield Diffie, Father of Public Key Encryption explains to Abhishek Raval and Revathi Raghavan, how companies lack in making the best use of existing tools and failure of 'confinement of processes'

PwC, MetricStream Ally To Integrate GRC Solutions

PwC, MetricStream Ally To Integrate GRC Solutions

.

GRC platform to improve risk-based decision-making capabilities.

Oracle Seeks New Trial Against SAP Over Downloads

Oracle Seeks New Trial Against SAP Over Downloads

.

Oracle rejected a potential $272 million award against SAP AG over copyright infringement allegations, opting for a new trial instead.

Six Trends That Will Drive Evolution Of IAM, Privacy Mgmt In 2012

.

Plenty of work still has to be done before the industry can produce a comprehensive and dependable identity architecture for the modern world, says Gartner.

QR Codes By Marketers Can Attract Attacks On Smartphones

QR Codes By Marketers Can Attract Attacks On Smartphones

.

A new type of spam campaign using QR codes has been recently spotted, says ESET.

Banks, Internet Cos Team Up To Fight Spam

Banks, Internet Cos Team Up To Fight Spam

.

Internet companies and financial services firms develop a new approach to fighting email spam.

Proactiveness And Awareness Is Key To IT Security

Proactiveness And Awareness Is Key To IT Security

.

With the changing environment, IT Risk Management has become an indispensable and inherent aspect of the CIO job responsibility.

McAfee Provides Complete Endpoint Security Through Whitelisting

McAfee Provides Complete Endpoint Security Through Whitelisting

.

The latest release of McAfee Application Control is integrated with McAfee Global Threat Intelligence to show the file reputation of every file in the enterprise.

F5's Certified Firewall Protects Against Large-Scale Cyber Attacks

F5's Certified Firewall Protects Against Large-Scale Cyber Attacks

.

ICSA Labs certifies BIG-IP Application Delivery Controllers to defend against DDoS and multilayer attacks.

Kaspersky Lab Named Leader In Magic Quadrant for Endpoint Protection Platforms

Kaspersky Lab Named Leader In Magic Quadrant for Endpoint Protection Platforms

.

Kaspersky Lab announced that it has officially been named a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms.

Dell Unveils DR4000 - BC/DR Solution For SMEs

Dell Unveils DR4000 - BC/DR Solution For SMEs

.

Dell DR4000 disk-to-disk backup storage platform helps reduce backup data by up to 15 times with deduplication and compression

Email Addresses Being Shared On Twitter, But Who Cares?

Email Addresses Being Shared On Twitter, But Who Cares?

.

Websense Security Labs has found that thousands of businesses are putting themselves at risk by revealing their email addresses on Twitter.

Prime Focus Selects InfoWatch To Keep Intellectual Property Secure

Prime Focus Selects InfoWatch To Keep Intellectual Property Secure

.

InfoWatch to protect intellectual property and guard against insider threats to confidential and sensitive data.

MetricStream Partners With US-based Qualys

MetricStream Partners With US-based Qualys

.

The partnership will result in integration of MetricStream IT-GRC Solution with QualysGuard Vulnerability Management

Hacker To Release Full Norton Antivirus Code

Hacker To Release Full Norton Antivirus Code

.

A hacker who goes by the name of 'Yama Tough' threatened on Saturday to release the full source code for Symantec's flagship Norton Antivirus software.

Managing Security On Smartphones Easier Than On Laptops

Managing Security On Smartphones Easier Than On Laptops

.

Sunil Gupta, Senior Vice President and Mobility Service Lines Head, Symphony Services advises CIOs on how to mitigate the security aspect in BYOD.

2012 Will See More Malware Camouflage: eScan

2012 Will See More Malware Camouflage: eScan

.

eScan report predicts Data Mining, Voice Mail Hacking and Social Engineering attacks will dominate in 2012.

Cyberthreat Forecast For 2012

Cyberthreat Forecast For 2012

.

Kaspersky Lab analyses the year gone by and predicts likely events and trends next year in the field of cybercriminal activities.

CIO And CISO Security Priorities For 2012

CIO And CISO Security Priorities For 2012

.

Kartik Shahani, Country Manager-India & SAARC, RSA, the Security Division of EMC, elaborates on CIO and CISO security priorities for 2012.

Threat Predictions For 2012

Threat Predictions For 2012

.

Rise in 'Legitimate' spam threats to mobile banking, virtual currency and embedded hardware expected in the coming year, says McAfee.