Most Australian businesses experienced an IT security attack in 2010, in the form of viruses, worms, phishing attacks or hacks, according to new research from Webroot.
The F5 Networks BIG-IP Global Traffic Manager (GTM) helps users deploy domain name system security extensions (DNSSEC) protection for newly signed .com and other internet domain types.
The M86 Web Filtering And Reporting Suite (WFR) version 4.1 integrates the M86 VuSafe service for schools. M86 VuSafe is an easy-to-use, secure video library enabling educators to find, tag, organise and share online videos from YouTube without showing inappropriate videos, advertisements, viewer comments or outside links. VuSafe is free to WFR users.
The ProSecure UTM150 unified threat management appliance can be used for data security for users adopting the cloud. With Stream Scanning technology, the appliance uses virus and malware threat databases from ProSecure and Sophos that are up to a claimed 400 times more comprehensive than legacy all-in-one platforms, at a speed that is up to a claimed five times faster than conventional methods.
The SecureSphere 8.5 security platform extends protection from insider threat with its enhanced agent technology for file and database activity throughout the IT infrastructure. It adds agent-based monitoring and auditing for DB2 z/OS mainframe databases, as well as open systems databases.
Following a hacking attack on RSA Security, which may have compromised the integrity of RSA’s SecureID two-factor authentication tokens, CA Technologies is offering all RSA SecurID token customers an opportunity to trade their RSA tokens for CA ArcotID secure software credentials in a one-for-one swap.
Security vendors like to throw around various apocalyptic scenarios in order to convince IT and security chiefs to buy the latest security doodads. But how realistic are these scenarios? Andrew Collins spoke to one penetration tester about the likelihood of one particular scenario: hackers compromising an airline’s IT security in order to blow up an aeroplane.
Symantec researchers have detected a new phishing scam that targets job seekers, turns them into inadvertent money launderers and hands unlimited access to their bank accounts over to cybercriminals.
A new compliance campaign from ACMA will help stop telemarketing scammers purporting to be from antivirus companies who infect consumers’ computers with malware and steal users’ personal information.
EMC announced last week that its SecureID system had been breached. According to one security consultancy, this breach may have completely compromised the two-factor authentication product, exposing customers’ systems to attack.
Kaspersky Lab products, Endpoint Security 8 for Mac, Endpoint Security 8 for Linux and Kaspersky Endpoint Security 8 for Smartphones, are designed to protect against IT security threats.
NXP Semiconductors and Giesecke & Devrient’s joint software solution offers secure interfaces between the handset, NFC functionality and secure elements such as the SIM card. This solution enables NFC to be integrated securely into mobile handsets based on the Android platform and other operating systems. In addition, the validated software will meet the needs of mobile network operators who require secure elements within the handset.
The FortiOS 4.0 operating system has been added to the FortiGate product family. The operating system introduces wireless controller extensions that support automatic provisioning of wireless access points, detection and suppression of rogue access points, multiple authentication methods and strengthened unified management of both wired and wireless networks from a single FortiGate platform.
SecureTransport simplifies and secures file transfers between people, sites, applications and external partners, providing visibility into information flows both within and outside of the organisation, while ensuring compliance with global mandates.
The FortiGate-3140B consolidated security appliance has been added to the FortiGate product family. The appliance is designed for large enterprises and data centres requiring maximum firewall, virtual private network and intrusion prevention system (IPS) performance to optimise protection against blended threats, destructive malware and constantly evolving attempts to breach security in high-speed network environments.