An increase in hacktivism and a greater prevalence of Advanced Evasion Techniques will form part of the backdrop of IT security in 2013, according to Stonesoft With 2013 just around the corner, it is time for IT security experts to reflect ...
Tags: Stonesoft, cyber threats, Evasion Techniques, IT security
Is your memory as sharp as it used to be? If you sometimes need a nudge to remember things, that nudge might someday come from a wearable device the size of a brooch or a Bluetooth earpiece that records your daily activities and ...
Tags: Intel, Tiny Chips, Wearable Computers, Bluetooth
Russian security firm Kaspersky Lab is developing a secure operating system for industrial control systems, its chairman and CEO Eugene Kaspersky said on Tuesday. "Quite a few rumors about this project have appeared already on the ...
Only 8% of European companies plan to decrease spending on antivirus and antimalware in 2013, a survey of IT security purchasing intentions has revealed. Some 21% of more than 250 IT professionals polled by Computer Weekly and TechTarget ...
Tags: European companies, antivirus, IT security, TechTarget
Red Level Networks, an IT solutions provider, announced today that it recently attained the Systems Management certification as well as both specialties in the Networking and Security certification from Dell. As a Dell Preferred Partner, ...
Tags: Red Level Networks, IT solutions, IT serveice, IT industry, software
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe. Despite the downturn, 40% of organisations plan to increase their security budgets in 2013 in ...
Tags: IT security, security budget, security spending, IT industry
Many organisations continue to rely on ineffective intrusion prevention systems (IPS) for defending information systems, says security firm Stonesoft. Advanced evasion techniques (AETs) – which combine several known evasion ...
The collaboration enables secure computing experiences and expands the security ecosystem Semiconducter firm AMD has partnered with chip maker ARM to build a platform security processor using ARM's Cortex-A5 TrustZone technology which ...
Tags: AMD, cooperation, online transaction
Vilnius-based ATB Security Technologies has installed a nine colour 330mm width Edale Beta modular flexopress with cold foil and hot foil, and a further array of special options, which joins the company's existing five colour Edale Alpha ...
Tags: ATB, modular flexopress, security labels
It's not exactly the type of advertisement most people would understand. For sale:"Our first 0day for Win8+IE10 with HiASLR/AntiROP/DEP&Prot Mode sandbox bypass(Flash not needed)."It's part of a recent message on Twitter from Vupen,a ...
Tags: Windows 8, Zero-Day Vulnerability, Vupen, computer security research
McAfee is the latest information security supplier to admit that the challenges facing organisations are so great that it will take cross-industry collaboration to turn the tide. A cross-industry approach is being advocated by other big ...
Tags: security data exchange, McAfee, latest information security supplier
Strategic planning is the only option if risk and security leaders want to succeed in a rapidly changing world,the opening session of the Gartner Security&Risk Management Summit 2012 heard in London. According to Gartner,the biggest ...
Tags: Gartner Security and Risk Summit, Strategic planning key to survival
IT budgets will continue to prioritise security for the next four years at least,despite the economic slowdown,with$60bn to be spent on security technologies this year. According to Gartner research,this is 8.4%higher than in 2011 and it ...
Tags: Security Spending, IT budgets, web security appliances, Gartner CIO
Infoworld - When it comes to IT security, FUD (fear, uncertainty, and doubt) is more than just the tool of overhyping vendors hoping to sell their next big thing. It is the reality that seasoned IT security pros live in, thanks in large ...
Tags: IT security, FUD, Paul Ferguson, antivirus scanner
The number of phishing websites detected reached an all-time high earlier this year, a sign that making fake websites spoofing real ones is still a lucrative trade for cybercriminals. In its latest report, the Anti-Phishing Working Group ...
Tags: Malware, Vulnerabilities, phishing website, APWG