Archive

Archive for January, 2009

Websense Wireless Security Expert to Present on Emerging Security & Web Content Threats in 3G at QuEST Forum EMEA

January 20th, 2009
Comments Off on Websense Wireless Security Expert to Present on Emerging Security & Web Content Threats in 3G at QuEST Forum EMEA

Websense, Inc. (Nasdaq: WBSN), a global leader in web security and web filtering productivity software, today announced that Mark Fogel, vice president for Websense(R) Wireless, a Division of Websense, Inc., will be giving a presentation on Emerging Security & Web Content Threats in 3G at the third annual QuEST Forum (Quality Excellence for Suppliers of Telecommunications) EMEA Conference in Warsaw, Poland, June 13-14, 2006.
Read more…

Uncategorized

AI-based Security Appliance Stops MySpace Email Scam

January 15th, 2009
Comments Off on AI-based Security Appliance Stops MySpace Email Scam

Espion has announced the discovery of the first email-based MySpace Spam Scam. At 5:35pm EST an email was trapped in our unprotected honey pot. At the same time an identical email was stopped by Espion´s Interceptor anti-spam and security appliance.
Read more…

Uncategorized

Compliance and mobility govern security

January 15th, 2009
Comments Off on Compliance and mobility govern security

The one segment in IT that has seen tremendous growth over the past few years is security. Despite advances in technology, security threats are growing at an alarming rate. The Indian network security market experienced a healthy growth in 2005 reaching about $116 million, up 70 percent compared to last year, says business consulting firm Frost & Sullivan.
Read more…

Uncategorized

Winny Virus Wrecks Data Havoc In Japan

January 15th, 2009
Comments Off on Winny Virus Wrecks Data Havoc In Japan

Top-secret military information, business documents of hundreds of corporate firms , personal and confidential data related to thousands of patients, complete information of Yahoo shopping mall, high profile information of Liberal Democratic Party and thousands more are all floating currently on the internet, creating an enormous flood of information leakage in Japan.
Read more…

Uncategorized

Protection from Emerging Virus Threats

January 15th, 2009
Comments Off on Protection from Emerging Virus Threats

Today’s malware distributors skirt traditional defenses by exploiting the zero hour gap, the time it takes to identify the attacking malware and write signatures that can detect and neutralize it. Recent studies have shown the lag time or gap between when a virus is recognized and a signature written to combat it can range from several hours to more than one day. Read more…

Uncategorized

Patching window is getting shorter

January 15th, 2009
Comments Off on Patching window is getting shorter

Internet Security Systems has published a report which shows that hackers and cyber criminals are developing malicious codes to exploit known vulnerabilities much faster than before. The X-Force Threat Insight Quarterly highlights that the number of vulnerabilities in 2005 has increased by over 33% over 2004.
Read more…

Uncategorized