Security researchers have identified a botnet controlled by its creators over the Tor anonymity network. It's likely that other botnet operators will adopt this approach, according to the team from vulnerability assessment and penetration ...
Tags: Security researcher, botnet, Tor network, DDoS
Taipei, Dec. 28, 2012 (CENS)--Amid fierce patent suits between Apple and Samsung, Taiwan Semiconductor Manufacturing Co. (TSMC) is enhancing its patent firewall by expanding cooperation with third-party silicon IP providers, including ...
Tags: Apple, Samsung, patent suits, silicon IP
An enduring disconnect between information management and infosecurity plagues corporate organizations,say data management experts. This has been a recurrent theme of SearchDataManagementUK interviews with people familiar with the state ...
Tags: data management, infosecurity
IT Governance Ltd, a leading cybersecurity management service provider, is warning organisations that they are exposed to ever greater risks resulting from new Internet-based threats being launched faster than ever. IT Governance Ltd, a ...
Tags: Web Based Applications, Productivity, Security, Computer Products
HERZELIA, ISRAEL, July 12, 2012 /24-7PressRelease/ -- Alentus announced today its partnership with GamaSec, a remote online website security scan service. GamaScan identifies web application vulnerabilities, provides real-time vital ...
Tags: Alentus, GamaSec, online website security scan service
New solutions provide complete protection against all kinds of threats with minimum impact on PC performance thanks to their cloud technologies The new Scan Manager scans up to 70 percent faster BERKSHIRE, ENGLAND, September 09, 2012 ...
Tags: Panda Security, Computer Products, Consumer Antivirus Solutions
Latest Virus Bulletin review allows for cloud-based scanning and showcases Panda Security's superior detection capabilities. Panda Cloud Antivirus Pro is one of the 34 certified solutions (out of 51 tested products). BERKSHIRE, ENGLAND, ...
Tags: Panda Cloud, VB100 Certification, Computer Products, Achieves Virus
Chief information security officers (CISOs) have an important role in moving their organisations, whether they are public or private, to a cloud computing environment, according to professional certification body (ISC)2. The move is ...
Tags: cloud computing, Chief information security officers, software, computer
Giving customers an element of control when it comes to storing their data in the cloud is the key to gaining their trust and, in turn, their patronage. This is the belief of Trend Micro’s solutions architect, Udo Schneider, who ...
Tags: Trend Micro, Encryption, cloud security, Computer Products
A home improvement retail chain can use an app running on an iPad to help design a customer's home, check inventory for the products, give a cost estimate to the customer, and take orders. Yet another app called iPeople allows human ...
Tags: iPad, SAP, Apple, Enterprise Mobility
HP has announced a range of new products with built-in software-defined networking (SDN) capabilities, placing a huge bet on the emerging technology. The company claimed that while other vendors have embraced SDN – which offers ...
Tags: HP, Portfolio, Computer Products, Networking
Security supplier Sophos has combined its endpoint protection and unified threat management (UTM) products into a single physical or virtual appliance. Sophos claims UTM 9 will cut the time and resources IT teams have to spend on ...
Tags: Sophos, UTM, Endpoint Security, Computer Products
People will spend more than £1,200 to buy their own devices, which questions the need for IT departments to continue purchasing and supporting desktop and laptop PCs. In a recent study by analyst Forrester, 33% of respondents ...
Tags: desktop, laptop PCs, self-service app, smartphones, VPN software
In an IT industry obsessed with the "next big thing", questions about how IT leaders are changing their strategies to cope with global economic turbulence are common. But if you ask something along those lines to the CIO of oil services ...
Tags: Halliburton, Ken Braud, IT operation, smartphones, global SAP ERP system
McAfee is expanding its mobile security software for Android tablets and smartphones, as it sees an increase in threats targeting Android devices, the Intel subsidiary announced on Monday. The new Mobile Security software has features ...
Tags: McAfee, mobile security software, Android, tablets, smartphones