Symantec Instant Messaging Security.cloud (IMS.cloud), with support for Microsoft Lync, is now available. The product helps organisations that communicate using instant messaging platforms address their security and compliance issues.
Triton provides enterprises with the deep protection, forensics and visibility necessary to understand which individuals are subject to attacks, cybercrime tactics and methods, attack communications and destinations, and what data is being targeted.
SharePoint’s ability to function as a data repository and a collaboration platform has made it popular with many organisations. As with any database of company data, security is paramount. Kane Lightowler*, Regional Director, Imperva Australia & New Zealand, provides five tips for securing corporate data in SharePoint.
Symantec is analysing a malware threat that it has labelled W32.Flamer, which the company says has been operating under the radar for at least two years, stealing documents and other user data, primarily from machines in the Middle East.
Across the internet, distributed denial of service (DDoS) attacks continue to increase in size and intensity. Businesses can minimise the damage from a DDoS with a well rehearsed DDoS mitigation plan, or 'playbook'.
ESET’s Endpoint Security Suite has been designed to provide ongoing protection against cybersecurity threats. The small system footprint, coupled with remote management of clients, make the solutions suitable for companies of all sizes.
Cybercriminals are exploiting a vulnerability in Adobe Flash Player in a targeted attack on manufacturers of defence products. According to Symantec, the attackers will soon cast a broader net aimed at a wider variety of organisations.
Logicalis Virtual Workspace (LVW) combines Cisco and Citrix desktop and application virtualisation, voice and video technology via a small footprint, virtual environment, combined with mobile device management to address the security, storage, cost and productivity concerns around bring your own device (BYOD) computing and mobile workforces.
DDoS protection service provider Prolexic Technologies has, today, released a threat advisory on the use of booter shells, which allow hackers to launch distributed denial of service (DDoS) attacks without the need for vast networks of infected zombie computers.
Cybercriminals are creating fake versions of popular smartphone apps, such as Angry Birds and the popular photo-sharing app Instagram, as a way to distribute their malware and earn money from unsuspecting users, warns IT security and data protection company Sophos.
Google’s Android is fast becoming the most popular mobile OS in the world. But the operating system’s security profile does not match its popularity - its open architecture and its ability to install applications from third party sources make it a target for malicious minds. Google’s recently announced ‘Bouncer’ program will increase Android security somewhat - but does it go far enough? Bitdefender's Alexandru Balan weighs in on the topic.
The average cost of data breaches on Australian organisations has risen for the third year in a row, reaching $2.16 million in 2011, according to a study from Symantec and the Ponemon Institute.
Unified Web Security is claimed to enable an organisation to expand its secure perimeter to users in any location, on any network, across any device, to close the security gaps that leave them exposed to malware threats and data loss.
Telstra Business has sent warnings to its customers and issued a list of security tips following an increase in cases of hackers gaining unauthorised access to business phone systems.
Users of Internet Explorer, Chrome and Safari are vulnerable to a new attack that lets remote attackers steal sensitive information held on private Microsoft SharePoint sites, as well as mine data from other public websites such as LinkedIn.