It’s everything from endpoint to perimeter
Barcelona, Spain – March 26, 2013 – Qustodio, a leading parental control software start-up, today announced the release of the latest version of its free software, now compatible with Mac OSX Lion/Mountain Lion and Android devices. It is already available for Window 8 PCs.
The latest version of Qustodio is aimed at giving parents better [...]
The BSIMM project continues to expand with data from 51 leading firms in 12 vertical markets and is now ten times its original 2009 size
Ghacks has a great blog posting today about hacking Skype with a script that then shows you a person’s IP address. As far as I’m concerned, this means that anyone running Skype has now picked up the vulnerability to be attacked by identity and IP address. Another reason why trading secure for free is a [...]
Do you know where your browser has been?
, D.C.—The U.S. departments of Commerce and Homeland Security (DHS) today discussed with other federal agencies and private-sector leaders in the information technology industry the need to create a voluntary industry code of conduct to address the detection and mitigation of botnets. Botnets are collections of computers that are secretly infected with malware and then [...]
Joe Stewart, Dell SecureWorks’ Director of Malware Research, and the Counter Threat Unit (CTU) research team have long been researching Advanced Persistent Threat (APT) hacking activity. Since different entities may use the term APT differently, it is important to define the term as used in this analysis. According to Stewart , APT is best defined [...]
CAMBRIDGE, Mass.– The APWG reports in the H2 2010 Phishing Activity Trends Report this month that the development of crimeware surged in the half-year period ending in December, 2010 with one data contributor registering more than 10 million new malware samples in the period, while other analysts describe important shifts in approaches to crimeware deployment [...]
Industry-Leading Endpoint Security Now Available for Large, Medium and Small Organizations
“As multinational enterprises face an ever-increasing number of security threats to their networks, Global Crossing recognizes the need to address – in a holistic manner – the entire spectrum of these potentially revenue-impacting attacks,” said Dave Carey, Global Crossing’s chief marketing officer. “Global Crossing Security Solutions cost-effectively extends our customers’ limited IT and security resources, and lets them concentrate on their core business while we keep their networks hardened and secure.”