Symantec acquires PGP |
- Symantec acquires PGP
- European privacy concerns regarding U.S. policies
- Fake Twitter email continues to plague inboxes, leads to malware
- The Storm botnet strikes again
- India now the primary producer of viruses
- The staggering cost of a data breach
- Rogue software details: Digital Protection
- Introduction to malware analysis
- In the security of mobile devices we trust, say users
- GFI LANguard learning videos
- Entrust brings strong authentication to mobile devices
Posted: 29 Apr 2010 07:47 AM PDT Symantec has signed definitive agreements to acquire PGP and GuardianEdge. Symantec will buy PGP for a purchase price of approximately $300 million in cash and GuardianEdge for approximately $70 milli... |
European privacy concerns regarding U.S. policies Posted: 29 Apr 2010 06:30 AM PDT There are a lot of people in Europe who feel that governments and companies should not be able to collect information of individuals so they can use it in ways that violate the privacy of individuals. |
Fake Twitter email continues to plague inboxes, leads to malware Posted: 29 Apr 2010 06:19 AM PDT Almost a week ago, Twitter began warning its users about fake Twitter Support emails. Since then, a couple of variants of the email have surfaced, with small differences in the text ("unreaded mess... |
The Storm botnet strikes again Posted: 29 Apr 2010 05:14 AM PDT Once upon a time, the Storm botnet was responsible sending out 20 percent of all spam, but was eventually crippled by the rise of new malicious software removal tools. By the end of 2008, it was thoug... |
India now the primary producer of viruses Posted: 29 Apr 2010 05:11 AM PDT India has pushed Korea into second place and taken over the mantle of the world's largest producer of internet viruses, according to analysis of internet threats in April by Network Box. India now ... |
The staggering cost of a data breach Posted: 29 Apr 2010 05:06 AM PDT The average cost of a data breach globally stood at USD 3.43 million last year, the equivalent of USD 142 per compromised customer record, according to research from the Ponemon Institute. Costs va... |
Rogue software details: Digital Protection Posted: 29 Apr 2010 04:59 AM PDT Digital Protection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Digital Protectio... |
Introduction to malware analysis Posted: 29 Apr 2010 01:12 AM PDT In this video, Lenny Zeltser will introduce you to the process of reverse-engineering malicious software. He will outline behavioral and code analysis phases, to make this topic accessible even to ind... |
In the security of mobile devices we trust, say users Posted: 29 Apr 2010 12:30 AM PDT The majority of mobile device users worldwide feel safe using their mobile devices for applications, including access online banking, according to research by Unisys. The latest wave of the bi-an... |
Posted: 29 Apr 2010 12:13 AM PDT GFI LANguard: Software Replacement In this video you see three tips on using GFI LANguard to replace an old piece of software, with a new application. GFI LANguard: Deploy GFI MailArchiver O... |
Entrust brings strong authentication to mobile devices Posted: 28 Apr 2010 11:12 PM PDT With the newest release of Entrust IdentityGuard, Entrust will add the innovative Entrust IdentityGuard Mobile application, which seamlessly authenticates consumer, corporate or enterprise users using... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment