Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
Guides
Botnet
A botnet is a collection of computers which have been taken control of and which are used in combination to send out spam and other malicious software
Trojan delivery exploits Ukrainian political situation
Hackers are using spam exploiting anti-western feelings in Russia to deliver malicious code for further spreading malware
Home entertainment system vulnerabilities
Experiment at Kaspersky Lab reveals the extent to which home entertainment systems lack security features exposing their users to unnecessary vulnerabilities
Russian mobile operator protects subscribers from spam
Cloudmark is providing Beeline mobile users in Russia with protection against spam, phishing and malware attacks
Organizational weak links contribute to increasingly dynamic threat landscape
Cisco's security report for the first half of 2014 shows trends in the threat landscape with more exploits targeting known weaknesses and legacy applications
Industrial control system security summit to be held in Amsterdam
The agenda has been set for the 2014 European ICS security summit which is taking place for control system engineers and IT security professionals in Amsterdam this September
Brazil sees peak in malware activity in June
The World Cup resulted in an increase in phishing activity within the banking sector and other malware during June according to Kaspersky report
New encrypting ransomware detected
Kaspersky Lab explains new malware discovered similar to CryptoLocker which demands ransoms for decrypting locked data assets
Large increase in DDoS attacks during 2Q2014
Prolexic report on global DDoS attacks shows greater than 240 percent increase in average peak bandwidth
Cooperative efforts to disrupt Shylock malware
Kaspersky Lab has joined an alliance of industry experts and law enforcement bodies to combat the Shylock malware targeting online banking
Continued protection needed against CryptoLocker threat
Bitdefender report explains the rise and temporary fall of the Cryptolocker malware and how companies need to continue to maintain protection against it
E-mail spam reaches almost 70% during May
May saw a small reduction in e-mail spam with mass educational mailings offering distance learning being predominant
Connected home risk survey results
Fortinet reveals the greatest risks that homeowners face with the extension of the "internet of things" into the home environment
A quarter of attacks target web services and applications
Threat data from NTT Com Security indicates levels of attacks being used to target web services and applications in the UK
Mobile protection from botnets and ransomware
David Emms of Kaspersky Lab comments on the disruption of GameOver Zeus and CryptoLocker and the need for mobile users not to lower their guard
How to avoid becoming a GOZeus and Cryptolocker victim
Kasperky Lab's David Emm provides some insignt into staying protected against the highly publicised GameOver Zeus and Cryptolocker threats
Anti-virus company joins fight against cyber crime
Bitdefender is offering its services to CERT and the police to enable them to use its experience in the escalating fight against cyber crime
USA takes action against botnet administrator
Dell SecureWorks has provided details of the actions taken against Cyrptolocker ransomware and the Gameover Zeus botnet
Short window to protect against Gameover Zeus
Websense provides advice on protection against the Gameover Zeus malware which is expected to soon launch a significant attack
Market forecast for cloud security products
Research report examines the market for cloud security services including virtualization out to 2019
Advanced attack protection for data centres
StealthWatch FlowSensor 4000 has been released for providing large network visibility and security against advanced attacks launched against enterprise data servers and data centres
Online stores suffer high phishing levels in March
Kaspersky Lab reports on March spam with high levels of phishing attacks launched at online shopping sites
Intelligence feed keeps anti-malware software up to date
Arbor Networks is using reputation based intelligence feeds to enable users of its Pravail products to identify and mitigate threats quickly
Global threat intelligence report available
Threat avoidance, response and detection feature within the 2014 global threat intelligence report from NTT Group
Analysis of spam environment in February
Kaspersky Lab releases its analysis of spam during February with Valentine's day exploitations featuring highly both in e-mail and on social networks
Multi-layered DDoS protection for Russia during Olympic event
Russia's Rostelecom protected its web services during the Sochi winter Olympic games with the use of DDoS threat mitigation services from Arbor Networks
UTM brings advanced threat protection to smaller businesses
A new Unified Threat Management platform from Sophos is aimed at providing high performance, advanced threat protection to the small and mid-market
Warning of new DDoS attack toolkit launch
Prolexic is issuing a warning of the availability of the DNS Flooder v1.1 toolkit for use by hackers launching malicious attacks
DDoS mitigation service with tenfold capacity
Service for dealing with the consequences of Distributed Denial of Service (DDoS) attacks increases bandwidth and mitigation capacity
IT threat trend predictions for 2014
ESET looks into the coming year and sets its predictions on how the challenges of IT security protection will be changing
Internet of things comes under focus in 2014 predictions
WatchGuard provides its take on what to expect in 2014 including the increasing prominence of the internet of things
Today’s Core Network Security Requires a New Approach to Prevent against Destructive SQL Attacks
Michael Sabo, VP of Marketing at DB Networks explains the continued prominence of SQL injection attacks and the approaches needed for their prevention
SMS message stealing Android malware discovered
MisoSMS malware active in China and Korea has been discovered which steals SMS text messages from Android devices
Database as a service plaform for malware
Hacker intelligence initiative report reveals the use of database as a service technology as a new cyber-criminal malware platform
Fake order confirmations and delivery notices
The holiday season is expected to be accompanied once more by fake delivery and shipment notices as well as order confirmations containing links to malware, warns Dell Secureworks
Managed sercurity service for Norway
Norwegian Broadnet is using cloud-based DDoS managed security from Arbor Networks to protect its customers
IT threat predictions for 2014
Fortinet is predicting Android malware on Industrial Control Systems as one of the key threats to watch out for in 2014
Phishing e-mails treble during last quarter
Kaspersky Lab report reveals the increased levels of malicious spam and phishing attempts during last three months despite overall reduction in spam levels
Cloud based security for Office 365
Zscaler is providing security and visibility for Office 365 using a cloud-based service without impacting bandwidth
Half of younger employees willing to break company BYOD policies
Fortinet reveals attitudes of Gen-Y employees towards Bring-Your-Own-Device (BYOD) policy restrictions with up to a half of them willing to contravene company rules
Web protection service added to cloud
Cloud computing platform for smaller businesses gains enhancement with web protection service featuring content filtering capability
Complex distributed network security
Peakflow SP network intelligence tool gains greater scalability for managing security on complex distributed IT networks
Cybercrime-as-a-service: SMEs can’t compete with lucrative trade
Raj Samani, VP Chief Technology Officer at McAfee EMEA reveals how cybercriminals take advantage of small business websites
Fraud protection on anonymous internet transactions
Iovation releases add-on for reputationManager to reduce fraud on anonymous proxy servers which have shown to be 30 times risker than transactions that are not performed anonymously
PHP application exploits affect internet general well-being
Report from Imperva investigates the use of PHP SuperGlobal parameters by hackers and how they are affecting the integrity of the internet
SMS with malicious link spreads Android trojan
Kaspersky has been tracking the Obad.a Trojan for Android devices discovering novel and effective distribution method
Heperbot trojan targets online banking users
Advanced Trojan focuses on online banking users in European and Asian countries supported by credible looking e-mail phishing campaigns
Threat intelligence, news and analysis available on ATLAS portal
Arbor Networks is now publishing its analysis and intelligence on global IT threats on its ATLAS threat portal
DDoS trends show high growth in 2013
Arbor Networks examines patterns of growth, attack size and duration of Distributed Denial of Service (DDoS) attacks for 2013
Ideological hacktivism - the top motivation behind DDoS attacks
According to Arbor’s 8th annual Worldwide Infrastructure Security Report (WISR) the number one motivation behind DDoS attacks is now ideological hacktivism. Darren Anstee, Solutions Architect, Global Team Lead from Arbor Networks guides us through the various types of DDoS attack.
Spam floods distract from illegal transactions
AppRiver details new technique of distracting users from fraud with floods of tens of thousands of spam messages
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com