Security News - Page 4

Notorious Remote Access Tool 'Poison Ivy' Makes A Resurgence

Notorious Remote Access Tool 'Poison Ivy' Makes A Resurgence

.

Report released by FireEye highlights theresurgence of Poison Ivy, a malware Remote Access Tool (RAT) that has remained popular and effective eight years after its original release-attacking.

Advanced Threats Will Drive High Growth In New Product Segment: IDC

Advanced Threats Will Drive High Growth In New Product Segment: IDC

.

As hackers have shifted their ultimate goals from disruption and notoriety to financial and intellectual property theft, the tactics they use have changed accordingly.

Virus Targets The Social Network In New Fraud Twist

Virus Targets The Social Network In New Fraud Twist

.

A computer virus widely used to steal credit card data, known as Zeus, has been modified to create bogus Instagram "likes" that can be used to generate buzz for a company or individual.

Cloud, BYOD Will Shape Next-Gen Security Solutions

Cloud, BYOD Will Shape Next-Gen Security Solutions

.

Venkatesh Swaminathan, Country Manager, The Attachmate Group, talks about the significance of cloud and BYOD in shaping the security landscape.

Ovum Sees Cloud Transforming The IAM Industry

Ovum Sees Cloud Transforming The IAM Industry

.

Traditional platform vendors are coming under pressure from a new generation of cloud-based specialists that are changing the way that IAM services will be consumed in the future.

IBM To Buy Trusteer

IBM To Buy Trusteer

.

Trusteer is a company that helps businesses fight computer viruses and fraud.

Are Cos Doing Enough To Fight Targeted Attacks?

Are Cos Doing Enough To Fight Targeted Attacks?

.

Managing vulnerabilities and threats tops the list of IT security priorities for security decision-makers with 90 percent of enterprises saying it is a high or critical priority.

BYOD Initiatives Offer New Opportunities For Consumer Security Providers

BYOD Initiatives Offer New Opportunities For Consumer Security Providers

.

Gartner believes that high consumer use of personal mobile devices for work purposes means security providers have an opportunity to assist enterprise BYOD initiatives.

BYOD Initiatives Offer New Opportunities For Consumer Security Providers

BYOD Initiatives Offer New Opportunities For Consumer Security Providers

.

Gartner believes that high consumer use of personal mobile devices for work purposes means security providers have an opportunity to assist enterprise BYOD initiatives.

Symantec Report Reveals Threefold Increase In Small Business Attacks

Symantec Report Reveals Threefold Increase In Small Business Attacks

.

Small businesses are attractive targets themselves and a way in to ultimately reach larger companies via "watering hole" techniques.

Employee Missteps Among Top Causes Of Data Theft

Employee Missteps Among Top Causes Of Data Theft

.

Employee error is one of the main causes of internal IT security incidents which lead to the leakage of confidential corporate data, finds Kaspersky Lab.

CA Technologies, NTT Com Security Partner To Offer IAM-as-a-Service

CA Technologies, NTT Com Security Partner To Offer IAM-as-a-Service

.

Alliance delivers IAM-as-a-Service hosted locally, in-country to help address data sovereignty needs.

Societe Generale India Secures Corporate Banking Customers With VASCO

Societe Generale India Secures Corporate Banking Customers With VASCO

.

The bank recently launched its online corporate banking solution and ensures safe transactions with VASCO's strong authentication solution.

ISACA Helps Enterprises Manage Vendors Using COBIT 5 Framework

ISACA Helps Enterprises Manage Vendors Using COBIT 5 Framework

.

New guide provides sample SLAs, case studies and mappings.

WatchGuard Introduces DLP Solution For Unified Threat Mgmt

WatchGuard Introduces DLP Solution For Unified Threat Mgmt

.

Library of more than 200 predefined, multi-country rules proactively protect personal, financial and healthcare data.

Managing Security Risks In The Contact Centre: Frost & Sullivan

Managing Security Risks In The Contact Centre: Frost & Sullivan

.

Frost & Sullivan analyses the risks for data breaches and theft in the contact centre, and helps contact centre managers understand the actions that can be taken to increase agent vigilance and data security.

SecPoint Unveils UTM Firewall With Vulnerability Assessment And Scanning

SecPoint Unveils UTM Firewall With Vulnerability Assessment And Scanning

.

This intrinsic two-way feature is available to both versions of the SecPoint Protector.

IBM Unveils Software To Help Cos Identify And Predict Security Risk

IBM Unveils Software To Help Cos Identify And Predict Security Risk

.

As cyber attacks increase in volume and severity, QRadar Vulnerability Manager helps identify, sort, contextualise and prioritise network vulnerabilities.

India Sees 280% Increase In Bot Infections

India Sees 280% Increase In Bot Infections

.

Spread of bot infections in more Indian cities: more phishing and virus-bearing emails target small Indian businesses.

ISACA Updates IS Audit And Assurance Standards

ISACA Updates IS Audit And Assurance Standards

.

The current update includes 17 standards that were restructured to include the definition of key terms, provide additional clarity and align with other global auditing bodies.

FireEye Uncovers Seven Zero-Day Vulnerabilities In First Half Of 2013

FireEye Uncovers Seven Zero-Day Vulnerabilities In First Half Of 2013

.

Each of the vulnerabilities uncovered by FireEye was exploited by advanced attacks across a number of applications, including Microsoft Internet Explorer, Adobe Flash, PDFs, Oracle and Java.

Solera Networks Unveils ThreatBLADES

Solera Networks Unveils ThreatBLADES

.

Unifies threat intelligence, Big Data security analytics and security visibility to protect against zero-day, advance persistent, web and email threats, spear phishing attacks and malicious files and botnets.

Cisco To Buy Sourcefire

Cisco To Buy Sourcefire

.

Analysts say this deal should spark more acquisitions in the industry as large vendors seek to profit from growing demand for IT security.

Lessons Learnt From UID Data Loss

Lessons Learnt From UID Data Loss

.

The possible misuse of citizen data, containing PANs and biometric information, has raised question marks around trusting UIDAI'S IT infrastructure with the data of a billion.

Human Errors And System Glitches Account For 74% Security Breaches In India

Human Errors And System Glitches Account For 74% Security Breaches In India

.

Employees are the backbone of an organisation, but they're also the biggest risk to the very data that makes a business thrive, finds study.

SafeNet Partners With Senetas To Protect Data In Motion

SafeNet Partners With Senetas To Protect Data In Motion

.

Global distribution agreement provides businesses with new high-speed data encryption technologies.

Cyber Security Spending In Critical Infra To Hit $46 Bn Globally

Cyber Security Spending In Critical Infra To Hit $46 Bn Globally

.

The cyber protection of critical infrastructure has become the most immediate primary concern for nation states, finds ABI Research.

Riverbed Introduces Enterprise-Class Server And Data Consolidation Solution

Riverbed Introduces Enterprise-Class Server And Data Consolidation Solution

.

New high performance, high capacity appliance enables consolidation of large branch offices and large data sets.

Cyber Attacks On Stock Exchanges Put Markets At Risk: Report

Cyber Attacks On Stock Exchanges Put Markets At Risk: Report

.

Around half of the world's securities exchanges were the target of cyber-attacks last year, according to a paper based on a survey of 46 exchanges.

Is Your IT Procurement Policy Outdated?

Is Your IT Procurement Policy Outdated?

.

Guriq Sedha, Research Director, Gartner shares his view on IT procurement in India. He also touches upon some of the gaps on today's IT governance policies.