Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
A botnet is a collection of computers which have been taken control of and which are used in combination to send out spam and other malicious software
Intelligence feed keeps anti-malware software up to date
Arbor Networks is using reputation based intelligence feeds to enable users of its Pravail products to identify and mitigate threats quickly
Global threat intelligence report available
Threat avoidance, response and detection feature within the 2014 global threat intelligence report from NTT Group
Analysis of spam environment in February
Kaspersky Lab releases its analysis of spam during February with Valentine's day exploitations featuring highly both in e-mail and on social networks
Multi-layered DDoS protection for Russia during Olympic event
Russia's Rostelecom protected its web services during the Sochi winter Olympic games with the use of DDoS threat mitigation services from Arbor Networks
UTM brings advanced threat protection to smaller businesses
A new Unified Threat Management platform from Sophos is aimed at providing high performance, advanced threat protection to the small and mid-market
Warning of new DDoS attack toolkit launch
Prolexic is issuing a warning of the availability of the DNS Flooder v1.1 toolkit for use by hackers launching malicious attacks
DDoS mitigation service with tenfold capacity
Service for dealing with the consequences of Distributed Denial of Service (DDoS) attacks increases bandwidth and mitigation capacity
IT threat trend predictions for 2014
ESET looks into the coming year and sets its predictions on how the challenges of IT security protection will be changing
Internet of things comes under focus in 2014 predictions
WatchGuard provides its take on what to expect in 2014 including the increasing prominence of the internet of things
Today’s Core Network Security Requires a New Approach to Prevent against Destructive SQL Attacks
Michael Sabo, VP of Marketing at DB Networks explains the continued prominence of SQL injection attacks and the approaches needed for their prevention
SMS message stealing Android malware discovered
MisoSMS malware active in China and Korea has been discovered which steals SMS text messages from Android devices
Database as a service plaform for malware
Hacker intelligence initiative report reveals the use of database as a service technology as a new cyber-criminal malware platform
Fake order confirmations and delivery notices
The holiday season is expected to be accompanied once more by fake delivery and shipment notices as well as order confirmations containing links to malware, warns Dell Secureworks
Managed sercurity service for Norway
Norwegian Broadnet is using cloud-based DDoS managed security from Arbor Networks to protect its customers
IT threat predictions for 2014
Fortinet is predicting Android malware on Industrial Control Systems as one of the key threats to watch out for in 2014
Phishing e-mails treble during last quarter
Kaspersky Lab report reveals the increased levels of malicious spam and phishing attempts during last three months despite overall reduction in spam levels
Cloud based security for Office 365
Zscaler is providing security and visibility for Office 365 using a cloud-based service without impacting bandwidth
Half of younger employees willing to break company BYOD policies
Fortinet reveals attitudes of Gen-Y employees towards Bring-Your-Own-Device (BYOD) policy restrictions with up to a half of them willing to contravene company rules
Web protection service added to cloud
Cloud computing platform for smaller businesses gains enhancement with web protection service featuring content filtering capability
Complex distributed network security
Peakflow SP network intelligence tool gains greater scalability for managing security on complex distributed IT networks
Cybercrime-as-a-service: SMEs can’t compete with lucrative trade
Raj Samani, VP Chief Technology Officer at McAfee EMEA reveals how cybercriminals take advantage of small business websites
Fraud protection on anonymous internet transactions
Iovation releases add-on for reputationManager to reduce fraud on anonymous proxy servers which have shown to be 30 times risker than transactions that are not performed anonymously
PHP application exploits affect internet general well-being
Report from Imperva investigates the use of PHP SuperGlobal parameters by hackers and how they are affecting the integrity of the internet
SMS with malicious link spreads Android trojan
Kaspersky has been tracking the Obad.a Trojan for Android devices discovering novel and effective distribution method
Heperbot trojan targets online banking users
Advanced Trojan focuses on online banking users in European and Asian countries supported by credible looking e-mail phishing campaigns
Threat intelligence, news and analysis available on ATLAS portal
Arbor Networks is now publishing its analysis and intelligence on global IT threats on its ATLAS threat portal
DDoS trends show high growth in 2013
Arbor Networks examines patterns of growth, attack size and duration of Distributed Denial of Service (DDoS) attacks for 2013
Ideological hacktivism - the top motivation behind DDoS attacks
According to Arbor’s 8th annual Worldwide Infrastructure Security Report (WISR) the number one motivation behind DDoS attacks is now ideological hacktivism. Darren Anstee, Solutions Architect, Global Team Lead from Arbor Networks guides us through the various types of DDoS attack.
Spam floods distract from illegal transactions
AppRiver details new technique of distracting users from fraud with floods of tens of thousands of spam messages
DDoS protection for Israeli telecoms operator
Bezeq International has taken Pravail from Arbor Networks for application layer protection against botnets and DDoS attacks
Threat report shows dramatic spam increases
McAfee threat report details increase in spam levels as well as greater numbers of targeted threats
DDoS Protection with web application firewall
Upgrade to Barracuda web application firewall provides additional protection against automatic distributed denial of service attacks
New malware variant drives phishing attacks
Threat emulation technology from Check Point has identified a malware variant responsible for phishing e-mail attacks
DDoS attack disrupts gaming community
Corero Network Security comments on the recent spate of attacks on Battlefield 3 demonstrating the spread of such cyber attacks
Critical monitoring with network packet brokering
Technology released by VSS Monitoring provides VBroker network packet broker platform to help network managers cope with data explosion
Malware targets Android multi-factor authentication
Dell has discovered the Stel trojan which is targeting Android users to steal text messages containing transaction authentication numbers
Responsible computing could have prevented Spamhaus DDoS attack
David Gibson, VP of Strategy at Varonis explains how internet providers and users can prevent harmful DDoS attacks through adopting a security culture
Spammers step up activities in February
Online banking credentials at risk as cyber criminals step up activities with spam campaigns during the first quarter of the year
Mobile threat landscape focuses on Android
Kaspersky Lab details threats to mobile users noting the favourite platform for cyber criminals is the Android operating system
Cloud-based sandboxing protects against APTs
FortiGuard Labs provides IT security professionals with IP reputation and cloud-based sandboxing technology to help in the fight against Advanced Persistent Threats
Mobile security report provides details of risky mobile apps
A consumer report released by McAfee examines the trends in mobile security with details of how risky apps are being used in sophisticated crime
Facebook credential stealing trojan discovered
ESET provides details of the way in which a new trojan works which operates on social networking sites to steal login credentials
Technology trends in cyber security
Leon Ward of Sourcefire examines the way cyber threats are developing and what can be done to cope with the changing threat landscape
Firewall offers integrated network security
The latest next-generation firewall solution from Fortinet provides greater network policy control and improved performance
Stonesoft predicts cyber threats for 2013
An increase in hacktivism and a greater prevalence of Advanced Evasion Techniques will form part of the backdrop of IT security in 2013, according to Stonesoft
FirePOWER provides protection against Advanced Persistent Threats
Sourcefire revamps its corporate protection family of products including the FirePOWER appliance to offer improved resistance to Advanced Persistent Threats (APT)
Cybercrime Centre Gels Expertise in Overcoming Threats
Arbor Networks comments on the UK Cybercrime Centre being discussed in Brussels to meet strategic challenges posed by latest generation cyber threats
Complex DDoS Threat Signatures Overcome Mitigation Methods
A new wave of Distributed Denial of Service attacks demonstrate increased sophistication and size of threats which are designed to overcome existing mitigation technology
PC Supply Chains Embed Malware in New PC Equipment
FireEye comments on the supply of new PC equipment ready loaded with malware that runs a botnet and which was pre-installed within the supply chain
Largest Rise In Malware In Four Years Detailed in Report
The threat report from McAfee shows the continued rise in levels of malware utilising all aspects of communications technology including flash drives and mobile phones
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012