Do you (and your users) know how to guard against scareware? How about Trojan horse text messages? Or social network …
How to stop 11 hidden security threats
Do you (and your users) know how to guard against scareware? How about Trojan horse text messages? Or social network …
Enabling SMB channels
In what looks set to be a big year for Trend Micro’s channel partners in the Middle East, the IT …
Group behind Twitter hack takes down Baidu.com
The group that took down Twitter.com last month has apparently claimed another victim: China's largest search engine Baidu.com. Baidu.com was …
Smartphone attacks, rogue antivirus, cloud breaches top 2010 security concerns
The rise of the Conficker worm and Heartland Payment Systems' enormous data breach were two defining security events in 2009. …
Virtualization security remains a work in progress
While adoption of server virtualization is proceeding at a gallop, the effort to refine virtualization security reached only a slow …
Virtualization security remains a work in progress
While adoption of server virtualization is proceeding at a gallop, the effort to refine virtualization security reached only a slow …
Virtualization security remains a work in progress
While adoption of server virtualization is proceeding at a gallop, the effort to refine virtualization security reached only a slow …
IRS scam now world's biggest e-mail virus problem
Criminals are waging a nasty online campaign right now, hoping that their victims' fears of the tax collecter will lead …
NY Times warns of rogue antivirus on Web site
Online scammers have apparently found a new way to reach their marks: They've started running ads on the Web site …
Twitter suspends accounts of users with infected computers
Twitter is suspending the accounts of some users whose computers have fallen victim to a well-known piece of malicious software …
Heightened DLP needs fuel arms race between vendors
Data-loss prevention is rapidly becoming the next big battlefield in IT security. Innovative start-ups in DLP, such as Reconnex, Orchestria, …
Cisco dual band entertainment router
Cisco today announced the Linksys by Cisco Dual-Band Wireless-N Gigabit Router (WRT320N), designed for consumers to create a media enabled …
The Business of Value
How has the Value team grown over the past year in terms of new solutions offered or new markets covered? …
The Cisco loyalist
How was 2008 for the company in terms of growth and how do you look at the economic slowdown impact …
Twitter hit with phishing attacks
Twitter users who thought friends were directing them to a “funny blog” Thursday ended up experiencing something completely different: a …
Conficker.E to self-destruct on May 5th?
The evolution of the multi-faceted Conficker worm is expected to take another turn this May 5th when the latest version, …
Cloud security stokes concerns at RSA
Cloud security has dominated discussions and drove the entire action at RSA Conference 2009. Throughout the event, attendees — who …
Conficker, the Internet’s No. 1 threat, gets an update
Security researchers say a worm that has infected millions of computers worldwide has been reprogrammed to strengthen its defenses while …
IT security vendors worth following on Twitter
Enterprise IT companies are setting up Twitter accounts in droves, and security companies are among the most enthusiastic given that …