SAN FRANCISCO, CA, June 13, 2012 /24-7PressRelease/ -- OPSWAT announced that their free security application removal tool, AppRemover, has been downloaded over one million times. Available at http://appremover.com, the tool enables easy and ...
Tags: AppRemover, security applications, McAfee, Symantec, OPSWAT
Manufacturer of the patented vehicle for deploying a mobile surveillance module joins other security industry companies to provide a solution for the on-going United States border security issues. Dallas-based TerraHawk, LLC has joined ...
Tags: TerraHawk, LLC, Security Technology Consortium, Computer Products
IT often virtualises new applications and workloads by default.Virtualisation is now the norm,deploying a physical server the exception.Yet,a third of companies admit they have not invested in security for their virtual computing ...
2012 has been a great year for the global security industry. This is especially true for many PSIM vendors who have seen their busiest year to date. We catch up with Keith Bloodworth, CEO of CNL Software, one of the world’s leading ...
Tags: PSIM, Market Predictions, 2013
Security operators in London were recently paid a visit by the Security Industry Authority searching for illegal operators The Security Industry Authority supported law enforcement partners on Friday night [07 Dec] as part of a ...
Tags: Security Industry, Security operators, Security, nightlife security
Enterprise IT security professionals faced increasingly sophisticated, stealthy and dynamic threats in 2012, but numerous surveys revealed that knowledge and understanding of the latest attack techniques are lacking in many organisations. ...
Tags: IT security, user security awareness, IT industry, cyber
Current business security models fail to prepare for cyber threats in the face of highly sophisticated, powerful cyber attack tools that are no longer the preserve of nation states, as they filter down to a wider community of attackers. ...
Tags: security models, hackers, cyber attacks, Cyber criminals
Researchers from Israel-based IT security firm Seculert have uncovered a custom-made piece of malware that infected hundreds of point-of-sale (PoS) systems from businesses in 40 countries in the past few months and stole the data of tens of ...
Tags: IT security firm, Seculert, malware, PoS systems
IDG News Service - In order to keep hackers at bay there must be changes in security budgets and privacy regulations, RSA Executive Chairman Art Coviello said on Tuesday. Coviello opened the RSA Conference Europe 2012 with a keynote that ...
Tags: Coviello, hackers, security budgets, privacy regulations, RSA
RJS Software Systems is holding its 2012 RJS User Group Conference beginning on Tuesday, September 18, 2012 at 6:00 p.m. at its Burnsville, MN headquarters. This will be the first meeting of its kind, and will give attendees a glimpse into ...
Tags: RJS Software Systems, document management, software, company news
You can now have your cake and eat it in the security world, as Viseum reports its intelligent surveillance cameras are reliably delivering 20 times more efficiency than standard CCTV monitoring cameras; 20 times less cameras means not only ...
Tags: surveillance camera, monitoring camera, hardware savings
Anti-malware vendor Webroot has bet the company on cloud. In October of last year, the company stopped selling packaged software and moved to a software-as-a-service (SaaS) model. CEO Dick Williams says the switch improves the customer ...
Tags: SaaS model, CEO, Dick Williams, service mode, cloud
Facebook has begun warning users whose computers are infected with the DNSChanger malware, a variant of the Zlob family of Trojans. The malware is designed to tell the infected computer to use a rogue Domain Name System (DNS) server, ...
Tags: Facebookm, computer security, DNSChanger malware, Trojans
Texas Instruments (TI) has unveiled its newest DaVinci video processors, underscoring the company's commitment to innovations that help make our world safer. The DaVinci DM385 and DM8107 video processors, announced at the China Public ...
Tags: Video processor, low light applications, video solutions
Threat data Future of hardware-assisted security Why Intel bought McAfee Defence in isolation and containment Social media, cloud, big data and mobile apps Video: McAfee co-president Michael DeCesare on consumerisation and security The ...
Tags: hardware-assisted security, Intel, McAfee Defence, Social media, cloud