New Android adware variants - Android.NewyearL.B and Android.Plankton.B have seen a large number of global infections in the past 90 days, finds Fortinet.
Symantec Corp.'s Internet Security Threat Report, Volume 18 (ISTR) revealed a 42 percent surge during 2012 in targeted attacks compared to the prior year.
Will the launch of the latest BlackBerry 10 (BB10) OS with two new devices (Z10 and Q10) aid BlackBerry regain lost ground and find its way back into the minds and hands of enterprise users?
Oracle Corp released a major security update for the version of Java programming language that runs inside Web browsers to make it a less popular target for hackers.
The partnership will establish a research, education and commercialisation model, to develop solutions and intellectual property for combating cyber security threats.
Haphazard patch management by companies implementing client system management tools puts them at risk of attack by cybercriminals.
According to IDC, encryption - one of the most effective and reliable data protection tools - is becoming increasingly popular.
Network security, managed and professional services are set to become the biggest category for business-to-business mobile security.
Ram Medury, Vice President – Technology, ICICI Lombard, shares some crucial aspects of updating an enterprise security strategy that CIOs should keep in mind.
India has of late witnessed a rise in cyber crime and experts attribute this to a "toothless" IT Act that has been ineffective in tackling the problem.
John Kendall, Director, National Security Program, Unisys APAC reveals challenges that CISOs face while maintaining a secure IT infrastructure and shares pointers on how to deal with them.
The significant rise in malicious Android programs has shaken the foundations of many CIOs' BYOD policies. Can BlackBerry rise to the occasion and offer some solace?
The evolution from hacktivism to financial gain to disguising more targetted attacks is evidence of a re-emerging trend that exploits the weaknesses and vulnerabilities of organisations.
Norton's Mobile Survey unveils mobility in the Consumer and Enterprise insights for Indian Business.
ESET researchers have noticed increase in spam pretending to come from Indian Income Tax Department.
By simplifying the deployment options, SMBs have the freedom to very easily move to the cloud when they're ready without adding complexity to their environment.
The predictions span a broad range of market segments including physical access control, logical access control, and mobile access control using NFC-enabled smartphones.
Most SIEMs require fine-tuning to get real value and can take months to get useful data, finds eIQnetworks survey.
New research reveals vulnerabilities up nearly 20 percent.
SafeNet was designated as 'a Leader' by Gartner Inc. for the second consecutive year.
Enabling organisations to protect corporate data against unauthorised access, ActivID Appliance is an essential component to ensure enterprise data security.
Cybercriminals up their game with beneath-the-OS threats and digitally-signed malware; malicious URLs eclipsing botnets as malware distribution leader.
Fifty percent of the mobile phone users in India do not use mobile security solutions, making them vulnerable to cyber-crime, a recent study by cyber security firm Symantec has found.
ArrayShield, the provider of pattern based two factor authentication product has announced the release of its IDAS 2FA Virtual Appliance.
Arun Kumar Anand, VP & CISO at NIIT Technologies talks about security measures at his organisation and people as the biggest hurdles to robust security.
The consumer banking website of JPMorgan Chase & Co was unavailable to some users as the company tried to deal with a denial-of-service cyber attack that slowed access for some customers.
Cyber security intrusions are evolving into organised crime. Amnon Bar-Lev, President, Check Point delivers pointers to develop strategies and policies that are simple and effective.
Australia's central bank confirmed that it had been targeted by cyber attacks and that no data had been lost or systems compromised.
Veeam's virtualisation data protection report 2013 shows capability, complexity and cost issues hampering IT departments.
Multi-year engagement to tap IBM cloud-based DR service to build enterprise resiliency<br /><br /><br /> while minimising data loss.