HP is expanding its Enterprise Security Solutions portfolio to help businesses deal with persistent security threats from cloud computing and social media. The new security portfolio is aimed at helping businesses deal with threats arising from mobile computing, the consumerisation of IT, the adoption of cloud services and social media….
Apple Promises Software Update to Kill ‘MacDefender’ Malware
Apple’s MacBook Air ships with Mac OS X Snow Leopard. Photo: Jon Snyder/Wired.com Apple has published instructions on removing a piece of malicious software that targeted Mac customers. The company claims that an upcoming Mac software update will remove the malware from infected systems. In a bulletin published Tuesday evening,…
Don’t Overload Your PC with Security Software
Reader Steve uses a program called Vipre Premium to keep his PC secure. The suite offers anti-virus, anti-malware, anti-spyware, a firewall, e-mail protection–basically, the works. But Steve also runs Malwarebytes Anti-Malware. And Microsoft Security Essentials (though with real-time protection turned off). Steve’s question: should he turn on MSE’s real-time protection…
Special Free Anti-Virus Offer for Server 2008/Hyper-V users from Sophos and 5nine Software
Special 90-day Offer for Server2008/Hyper-V Users – Free Anti-Virus from Sophos and 5nine Software Holmdel, NJ and Abingdon, UK (PRWEB) August 16, 2011 Today Sophos and 5nine Software announce a special 90-days Offer for Microsoft Server 2008 R2 / Hyper-V Users – free Enterprise Anti-Virus (AV) and Anti-Spyware (AS) with…
LIGATT: Back Orifice is: A. A worm B. A word processor C. Trojan horse software D. Scanning software
LIGATT: Back Orifice is: A. A worm B. A word processor C. Trojan horse software D. Scanning software View full post on Twitter / LIGATT
LIGATT: The answer is C. Trojan Horse software
LIGATT: The answer is C. Trojan Horse software View full post on Twitter / LIGATT Gregory Evans | LinkedIn Interview With Gregory Evans Gregory Evans Security Expert Gregory Evans on Cyber Crime
LIGATT: The answer is D. Software Vendors (The reason is security baselines are often established by software vendors for the software they write.)
LIGATT: The answer is D. Software Vendors (The reason is security baselines are often established by software vendors for the software they write.) View full post on Twitter / LIGATT Gregory Evans | LinkedIn Interview With Gregory Evans Gregory Evans Security Expert Gregory Evans on Cyber Crime