The administrators of reseller and integrator 2e2, which looks sure to enter liquidation, have sold off its managed services business to O2 in a move that will see 107 employees move over to the mobile operator. O2, which worked with 2e2 ...
Tags: liquidation, 2e2, mobile operator
Panda Security, The Cloud Security Company, today announced the beta release of version 6.50 of Panda Cloud Office Protection Advanced, the first cloud-based endpoint security solution with protection for Exchange Server. Main new ...
Tags: Panda Security, Cloud Security, Panda Cloud Office Protection Advanced
Kaspersky Lab on Wednesday made its bid to reduce the complexity associated with managing IT security processes in corporate environments, with a new product that combines the company's anti-malware technology with new mobile and system ...
Tags: Kaspersky Lab, IT security processes, corporate environment
Kaspersky Lab on Wednesday made its bid to reduce the complexity associated with managing IT security processes in corporate environments, with a new product that combines the company’s anti-malware technology with new mobile and ...
Tags: Kaspersky Lab, IT security processes, new mobile, anti-malware technology
Organisations report that investment in IT and systems security can deliver ROI. Research by Turnkey consulting revealed that organisations investing in security are increasingly seeing a positive ROI. 38% of enterprises view IT ...
The Shylock home banking malware has been updated with new functionality that allows it to spread automatically using the popular Skype Voice-over-IP (VoIP) and instant messaging client. Shylock, named after a character from Shakespeare's ...
Tags: banking malware, Shylock, Skype Voice-over-IP, network security
Showing what can happen when companies don't periodically review network logs, a software developer working for a large U.S. critical infrastructure company hired a Chinese firm to do his job so he could spend time surfing Reddit and ...
Tags: network logs, software, critical infrastructure, IT
Experts and readers of PC Magazine Russian Edition present awards to the best software solutions of 2012 BERLKSHIRE, ENGLAND, January 17, 2013 /24-7PressRelease/ -- Panda Security's free solution, Panda Cloud Antivirus, has received the ...
Built on technology from EMC's acquisition of Syncplicity last May and its EMC Isilon scale-out NAS, the idea is to provide a secure, easy-to-use solution for file sync and sharing across devices, but on highly scalable, on-premise ...
Tags: EMC, acquisition, Syncplicity, IT control
The hundreds of ctargeted in a large-scale cyberespionage operation dubbed Red October were not only attacked using malicious Excel and Word documents as previously believed, but also by using Web-based Java exploits, according to ...
Tags: cyberespionage, Red October Cyberespionage Attacks, cyber security
Built on technology from EMC’s acquisition of Syncplicity last May and its EMC Isilon scale-out NAS, the idea is to provide a secure, easy-to-use solution for file sync and sharing across devices, but on highly scalable, on-premise ...
Tags: EMC, Syncplicity, storage product
Computerworld-NEW YORK-Tablet computing has become a top priority of Fortune 500 CIOs and will eclipse PC use by 2015,if not sooner.Email is becoming a legacy technology in the face of social media.And consumer app stores are offering ...
Tags: enterprise IT, Apps stores, mobile devices
Mobility and security hardly go hand-in-hand. But not at the Essar Group. In fact, for this Indian, multinational conglomerate, security was the stepping stone to enterprise mobility and a vibrant BYOD environment. What got the ball ...
Tags: Meridian Infotech, electronical development, wireless solution, security
Infoworld-Network and endpoint security may not strike you as the first place to scratch an experimental itch.After all,protecting the company's systems and data should call into question any action that may introduce risk.But IT security ...
Tags: crazy IT security tricks
DENVER, CO, July 28, 2012 /24-7PressRelease/ -- Computer hackers are unauthorized users who break into computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or ...
Tags: Computer hackers, computer systems, computer security, Software, iComputer