Your are here:hacking technology > hacker invade > Article list

Home > hacker invade > Page 15
McAfee and WireworX to provide managed security services to UK micro-businessesHits:21
McAfee, Inc.has announced a partnership tie-up with WireworX to add managed security services to WireworX's IT services offering for UK micro-businesses (companies with 1-10 employees). Protection against viruses, hackers, spyware and spam...04/17/2009
Sun Microsystems opens multi-level security laboratory in LondonHits:104
Sun Microsystems, Inc. has announced the opening of a multi-level security laboratory in London to demonstrate how different organisations can interoperate within multiple network environments whilst maintaining the highest levels of...04/16/2009
Staff crime is the biggest threat according to security industry professionalsHits:117
New research from G4S Security Services reveals that the majority of security industry professionals (72%) would not be confident in relying upon technology alone as an effective security solution. Only 28% said they would be...04/16/2009
61% of companies have high risk vulnerabilities in their Internet connectionsHits:10
NTA Monitor's 2006 Annual Security Report has discovered that 61% of companies tested have one or more high risk vulnerability in their Internet connections. NTA classifies a high risk flaw as a vulnerability that allows unauthorised...04/15/2009
CRYPTOCard provides strong authentication and identity management to Interoute clientsHits:10
CRYPTOCard and Interoute have announced a strategic partnership to deliver a new form of strong authentication and identity management to Interoute's client base across the globe. CRYPTOCard's Managed Authentication Service (CRYPTO-MAS...04/15/2009
Protegrity Defiance Security Software Defends Against Sophisticated Attacks on Business ApplicationsHits:13
As recent, highly public data breaches show, organizations must address sophisticated attacks on business applications and data by implementing an all-encompassing approach to data protection. Protegrity Corporation has released the newest...04/14/2009
SafeNet combines disk encryption with two-factor authentication to secure critical data on mobile deHits:12
SafeNet, Inc. has combined its SafeEnterprise ProtectDrive disk encryption product and its Borderless Security iKey 2032 identification token to provide scalable encryption and authentication-based access security for secure remote...04/14/2009
Revenues from cybercrime now exceed those of drug crimeHits:35
Revenues from cybercrime at 1 trillion annually are now exceeding those of drug crime. This was the testimony from AT T's Chief Security Officer Edward Amoroso, which he gave to a US Senate Commerce Committee. These findings have been conf...04/13/2009
Name.com joins VeriSign Identity Protection NetworkHits:38
In the wake of some recent high-profile hacker attempts to steal the passwords of millions of customers, businesses, including domain name service providers, are exploring options for added protection to ensure that Web site administrators...04/13/2009
Bluetooth-enabled devices in visible to all mode are wide open to attackHits:46
People are not aware of the security risk posed by Bluetooth, according to research by Kaspersky Lab. The company conducted research in London and in the space of three days detected more than 2,000 Bluetooth-enabled devices in 'visible to...04/11/2009
Companies are not vigilant enough against the growing menace of professional hackersHits:18
The latest Deloitte Global Security Survey has shown that more than three-quarters of the world's leading 150 finance groups suffered a serious security breach in the last 12 months. 78% of these companies have experienced a breach...04/11/2009
NHS fails to secure data on mobile devicesHits:12
A survey into 'Mobile device usage in the healthcare sector' carried out by Pointsec Mobile Technologies and the British Journal of Healthcare Computing Information Management has revealed that one fifth of the devices used to store...04/09/2009
Organisations are opening up corporate network to hackers by not securing remote workersHits:20
Organisations are not protecting their networks, according to research carried out by SafeNet. Passwords are still the most common security measure for mobile working, with 71 per cent relying on it, and yet it has long been known that...04/09/2009
Email scammer claims to have discovered a cure for AIDSHits:13
An email scam attempts to fool people into believing that the sender has found a cure to AIDS. The emails, which come from a Yahoo email address, claim that the 19-year-old correspondent has found a herbal root that has successfully helped...04/08/2009
Artificial Intelligence and Google malware searches are latest tools in the hacker toolboxHits:18
Artificial intelligence (AI) software used in testing by a small number of software developers is now being widely used by hackers to find formerly undiscovered vulnerabilities. These AI tools use a methodology referred to as Fuzzing. This...04/08/2009

Home  <<Prev  10   11   12   13   14   15   16   17   18   19   20  Next>>  Last

Current Page:15 , Total 35 Pages, Every Page 15 Records, Total Records: 518

Hot Articles
Recommend Articles
New Articles
Sub category