You Are Browsing ‘Security ’ Category

Comments Off on SCALABLE to Demonstrate Cyber Security Solutions for Critical Infrastructure at the Black Hat Security Conference

(Source: MarketWired) The demonstrations will take place at the Parsons booth number 727 in the business hall, highlighting SCALABLE’s support of Parsons’ cyber security for critical … ...

Comments Off on Android RAT impersonates Kaspersky Mobile Security

(Source: Help Net Security) “To prevent theft of cash from your account, please promptly install Kaspersky Mobile Security Antivirus on your mobile device,” it urges, and apparently helpfully … ...

Comments Off on Vodafone Awarded for its Cyber Security Creds

(Source: Recombu) Data security has been a pretty hot topic of late, with dozens of big companies finding their storage systems hacked and customer data with pinched or leaked … ...

Comments Off on Black Hat, DefCon Talk to Focus on Smartphone Security, USB Flaws

(Source: eWEEK) NEWS ANALYSIS: Bolstering Smartphone security, USB vulnerabilities and the endless reverberations from the NationalSecurity Agency document links will be … ...

Comments Off on Security tech firm Verdasys rebrands as Digital Guardian while raising $20M

(Source: Venture Beat) Security tech firm Verdasys is rebranding itself as Digital Guardian under new chief executive Ken Levine. He’s also in the midst of raising a $20 million round of … ...

Comments Off on Check Point Launches Two New Security Gateways

(Source: Telecompaper) Check Point Software Technologies has announced the launch of two new securitygateways that extend the company’s data centre network security portfolio. ...

Comments Off on Oracle-Powered Passport Database is on the Fritz

(Source: InfoWorld) According to the Associated Press and other news outlets, the State Department’s visa and passport database, built with Oracle database technology, has been … ...

Comments Off on Hackers Exploiting Internet Explorer to Expose Computers’ Security Flaws

(Source: Business Technology) Hackers are exploiting flaws in Internet Explorer to search computers and discover their security vulnerabilities, according to a security firm. ...

Comments Off on Ecrypt Technologies, Inc. (ECRY) Stands to Benefit from Hyperactive Investments in Cybersecurity

(Source: InvestorIdeas) Take for example Ecrypt Technologies, an emerging provider of military-strength data security solutions for enterprise, government, and military. The company’s … ...

Comments Off on Forrester: Keep Your Eye on the Email

(Source: Direct Marketing News) Email marketers who rated their vendors for the benefit of the Forrester Wave report released this week told the researcher they cared more about data security, … ...