Security News - Page 4
Notorious Remote Access Tool 'Poison Ivy' Makes A Resurgence
Report released by FireEye highlights theresurgence of Poison Ivy, a malware Remote Access Tool (RAT) that has remained popular and effective eight years after its original release-attacking.
Advanced Threats Will Drive High Growth In New Product Segment: IDC
As hackers have shifted their ultimate goals from disruption and notoriety to financial and intellectual property theft, the tactics they use have changed accordingly.
Virus Targets The Social Network In New Fraud Twist
A computer virus widely used to steal credit card data, known as Zeus, has been modified to create bogus Instagram "likes" that can be used to generate buzz for a company or individual.
Cloud, BYOD Will Shape Next-Gen Security Solutions
Venkatesh Swaminathan, Country Manager, The Attachmate Group, talks about the significance of cloud and BYOD in shaping the security landscape.
Ovum Sees Cloud Transforming The IAM Industry
Traditional platform vendors are coming under pressure from a new generation of cloud-based specialists that are changing the way that IAM services will be consumed in the future.
Are Cos Doing Enough To Fight Targeted Attacks?
Managing vulnerabilities and threats tops the list of IT security priorities for security decision-makers with 90 percent of enterprises saying it is a high or critical priority.
BYOD Initiatives Offer New Opportunities For Consumer Security Providers
Gartner believes that high consumer use of personal mobile devices for work purposes means security providers have an opportunity to assist enterprise BYOD initiatives.

BYOD Initiatives Offer New Opportunities For Consumer Security Providers
Gartner believes that high consumer use of personal mobile devices for work purposes means security providers have an opportunity to assist enterprise BYOD initiatives.
Symantec Report Reveals Threefold Increase In Small Business Attacks
Small businesses are attractive targets themselves and a way in to ultimately reach larger companies via "watering hole" techniques.
Employee Missteps Among Top Causes Of Data Theft
Employee error is one of the main causes of internal IT security incidents which lead to the leakage of confidential corporate data, finds Kaspersky Lab.
CA Technologies, NTT Com Security Partner To Offer IAM-as-a-Service
Alliance delivers IAM-as-a-Service hosted locally, in-country to help address data sovereignty needs.
Societe Generale India Secures Corporate Banking Customers With VASCO
The bank recently launched its online corporate banking solution and ensures safe transactions with VASCO's strong authentication solution.
ISACA Helps Enterprises Manage Vendors Using COBIT 5 Framework
New guide provides sample SLAs, case studies and mappings.
WatchGuard Introduces DLP Solution For Unified Threat Mgmt
Library of more than 200 predefined, multi-country rules proactively protect personal, financial and healthcare data.
Managing Security Risks In The Contact Centre: Frost & Sullivan
Frost & Sullivan analyses the risks for data breaches and theft in the contact centre, and helps contact centre managers understand the actions that can be taken to increase agent vigilance and data security.
SecPoint Unveils UTM Firewall With Vulnerability Assessment And Scanning
This intrinsic two-way feature is available to both versions of the SecPoint Protector.
IBM Unveils Software To Help Cos Identify And Predict Security Risk
As cyber attacks increase in volume and severity, QRadar Vulnerability Manager helps identify, sort, contextualise and prioritise network vulnerabilities.
India Sees 280% Increase In Bot Infections
Spread of bot infections in more Indian cities: more phishing and virus-bearing emails target small Indian businesses.
ISACA Updates IS Audit And Assurance Standards
The current update includes 17 standards that were restructured to include the definition of key terms, provide additional clarity and align with other global auditing bodies.
FireEye Uncovers Seven Zero-Day Vulnerabilities In First Half Of 2013
Each of the vulnerabilities uncovered by FireEye was exploited by advanced attacks across a number of applications, including Microsoft Internet Explorer, Adobe Flash, PDFs, Oracle and Java.
Solera Networks Unveils ThreatBLADES
Unifies threat intelligence, Big Data security analytics and security visibility to protect against zero-day, advance persistent, web and email threats, spear phishing attacks and malicious files and botnets.
Cisco To Buy Sourcefire
Analysts say this deal should spark more acquisitions in the industry as large vendors seek to profit from growing demand for IT security.
Lessons Learnt From UID Data Loss
The possible misuse of citizen data, containing PANs and biometric information, has raised question marks around trusting UIDAI'S IT infrastructure with the data of a billion.
Human Errors And System Glitches Account For 74% Security Breaches In India
Employees are the backbone of an organisation, but they're also the biggest risk to the very data that makes a business thrive, finds study.
SafeNet Partners With Senetas To Protect Data In Motion
Global distribution agreement provides businesses with new high-speed data encryption technologies.
Cyber Security Spending In Critical Infra To Hit $46 Bn Globally
The cyber protection of critical infrastructure has become the most immediate primary concern for nation states, finds ABI Research.
Riverbed Introduces Enterprise-Class Server And Data Consolidation Solution
New high performance, high capacity appliance enables consolidation of large branch offices and large data sets.
Cyber Attacks On Stock Exchanges Put Markets At Risk: Report
Around half of the world's securities exchanges were the target of cyber-attacks last year, according to a paper based on a survey of 46 exchanges.
Is Your IT Procurement Policy Outdated?
Guriq Sedha, Research Director, Gartner shares his view on IT procurement in India. He also touches upon some of the gaps on today's IT governance policies.