Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
A piece of malicious code that monitors a computer's keyboard activity and sends it to the recipient without the computer user's knowledge. This enables the recipient to gather intelligence data to build sufficient information concerning the user to commit crimes such as compromising passwords and accessing financial resources.
Behavioural attack detection protects pharmacies
Pharmacy software supplier takes additional protection against cyber attacks by using behavioural attack detection platform
Spam campaign delivers Ursnif malware
Bitdefender discovers renewed campaign delivering Ursnif malware designed to target English, Russian and German speakers
Secure tamper proof USB 3.0 flash drive
Secure flash drive from iStorage for the storage of sensitive data is accredited to FIPS 140-2 level 3.
Total security for safeguarding all aspects of digital lives
Kaspersky Lab explains the holistic approach it is now taking with the release of Total Security - Multi-Device to provide protection for all aspects of its customer's digital lives
Free tool for removing unsolicited browser add-ons
Unwanted adverts, toolbars and browser add-ons can now be simply eliminated with a new tool available from BitDefender
Travelling executives warned of Darkhotel threat
Highly targeted cyber espionage techniques are being used against commercial travellers with highly valuable information warns Kaspersky Lab
Survey illustrates risks to social network users
Complacency towards personal security is still widespread amongst social network users according to results of a new survey
Two-Factor Authentication secures cloud service provider
A cloud computing service provider in Switzerland is ensuring secure access for its clients with the use of SecurAccess two-factor authentication from SecurEnvoy
Heperbot trojan targets online banking users
Advanced Trojan focuses on online banking users in European and Asian countries supported by credible looking e-mail phishing campaigns
Privacy Suite Provides Protection For Confidential Data
Password Vault, e-mail encryption and secure vaults feature on Steganos Privacy Suite from Avanquest
High Detection Rate Success For Bitdefender Quickscan
Bitdefender's free malware detection scanner achieves high levels of infection detection during first quarter
Using QR Codes For Malicious Purposes
Check Point provides some background on emerging Quick Response codes and how they can be used to exploit browser curiosity and lead them to exploit sites
Duqu The Latest Short-Lived Star of Malware
Bitdefender places the Duqu rootkit in historic perspective comparing it to other stars of the malware theatre
Anti-Virus System Released For Smaller Businesses
Avast Business Protection delivers tried and tested anti-virus solution with mobile administration designed to meet the needs of smaller businesses
6 Reasons To Go To Avast 6.0
Avast has released version 6.0 of its successful free antivirus product including website content reputation guide and AutoSandbox features
SafeZone Keeps Transaction Data Safe Usine Virtualized Desktop
Avast! 6.0 will include the SafeZone virtualised desktop for ensuring the security of financial transactions on computers even if they are infected
January Sees Rise Of Multifunctional Worm
Kaspersky Lab reports on january emergence of worm which uses e-mail to spread malicious links adding the users computer to botnets
Unified Access Gateway With GrIDsure Secure Authentication
Users of SSL VPN remote access using Unified Access Gateway from Microsoft now have the option of gaining additional secure authentication capability using GrIDsure pattern based authentication technology
Password Thieving Botnet Tracked by AVAST
Anti-virus company goes on the trail of the Kroxxu botnet and examines the progress of the password stealing malware that has so far compromised over 100,000 domains
Zeus Targeting Enterprise Access Gateways
Amit Klein, Trusteer's CTO explains how Zeus is stealing logon credentials to enterprise access gateways.
Cloud Based Reputation Enabled Defence From WatchGuard
Web security service provides businesses with protection against malware, botnets and other web-based threats through the company's Reputation Enabled Defence product
New Trojans Appear In JulyÃÂÃâ€ÂÃâ€Âs Top Ten Malware List
Sunbelt Software's top 10 malware threat list for July has been published with Trojans and the Conficker worm being high on the table of threats which bombarded users during the month
Top Tips For Mobile Computer Users During The Holiday Season
If you're planning to take your portable computer with you on holiday, ESET advises following the company's 13 tips for safe computing while you're away
Native OS Available On Secure Encrypted USB Flash Device
Spyrus has received a patent on the Secure Pocket Drive which is equipped with Windows Embedded OS for launching a secure fully operating computing environment
Free ZoneAlarm Firewall Available from Check Point
Bolstering anti-virus protection, the new ZoneAlarm Firewall makes use of community information to update itself to latest threats offering additional protection for no extra cost
Visa Issues Till Terminal Keylogger Threat Warning To Retailers
Increased incidences of card fraud using information gained from keylogging transaction terminals requires retailers to maintain security levels of their IT equipment to prevent malware infection
Phishing Scam Targets Customers of Barclays Bank
BitDefender has provided advice aimed at Barclays Bank customers to avoid falling victim to phishing attempts which seek to gain confidential password information for access to bank accounts
Cyber Intelligence Report Indicates Online Attacks Becoming More Targeted
Cyber criminals become more sophisticated as phishing becomes more focused on lucrative targets according to Cyveillance's latest Cyber Intelligence Report
Housing Association prevents data leakage with DeviceLock
Data transfer control to storage devices, USB attached equipment and smartphones controlled at Oaklee Housing Association to prevent to leakage of sensitive tenant data
Access control challenges to face educational networks in 2010
WatchGuard has made some predictions on the most significant threats to affect educational IT networks in 2010 with increased use of mobile devices contributing to the significant challenge of network access control
A decade of cybercrime predictions from Imperva
Five trends in IT security identified by Imperva for the dawn of the new decade including the commercialization of hacking and a move to proactive security technology
Mobile synchronisation capability between mobile devices and DeviceLock Protected hosts
BlackBerry and iPhone users can now synchronise their devices with desktops and laptops protected by DeviceLock 6.4.1
Forensic data analysis tool raises the blockades against cyber crime
Logger 4 from ArcSight provides the capability of small or large firms to launch effective and powerful investigations into cyber-criminal activity
Anti-virus protection against zero-day threats
Lumension has added another layer to its endpoint protection products with the introduction of Lumension Anti-Virus to protect against malware and zero day threats
Windows 7 endpoint protection
Context aware data loss prevention features in DeviceLock 6.4.1 for endpoint protection in Windows 7 environments
Control software to prevent data leakage through removable media
Access control device for preventing the transfer of data to unencrypted removable media helps prevent corporate data leakage
Keylogging and the ease with which hackers can plunder bank accounts
Comodo looks into the latest generation of criminals using keylogging software and malware to gain access to bank accounts
Oil company secures endpoints with DeviceLock
Russian oil giant Gazprom Neft has chosen to protect its extensive network of endpoints from data leakage and trace user access to peripheral devices
DeviceLock installed base reaches 4 million
Global demand for endpoint protection drives sales at DeviceLock to record levels across all continents
Nine Ball protection for Check Point Endpoint Security users
Malicious site re-direct malware will not compromise the endpoints of users of Check Point's Endpoint Security software where the exploit will be stopped
Apple acknowledges need for additional virus protection
New Mac Operating System which is under development incorporates further security features but will still need software for protection against viruses
DeviceLock DLP for Reno casino
The Silver Legacy Resort in Reno extends its use of Data Loss Prevention software from DeviceLock
South African distribution agreement for DeviceLock
First Distribution of South Africa to act as distributor in the region for DeviceLock's range of endpoint protection technology
Endpoint security protection for seafood industry body
DeviceLock software has been installed at "Seafish" to protect endpoints and peripheral devices from data loss
Identity theft warning in run-up to the Grand National
With the Grand National set to take place this weekend, Webroot is warning users to be cautious in placing online bets when visiting horse racing websites
DeviceLock protects information assets at large Russian bank
Sberbank of Russia selects DeviceLock for its Bashkir branch to lock down endpoints and prevent either accidental or deliberate data leakage
Firewall denies all program executions by default
Comodo's default deny approach to firewalls enables only those programs to execute which have been whitelisted
Russian nuclear centre chooses DeviceLock for data protection
A Russian nuclear and scientific research centre has protected its information resources from unauthorised leakage of data by using DeviceLock
Earnings growth for DLP supplier
Experts in Data Leakage Prevention continue to demonstrate sustained growth in worldwide markets through 2008
Data port control for critical networks
Protector from Credant provides control for data ports preventing information leakage from government and critical civilian networks
First | Prev  | 1 | 2  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo