Quantcast
Last updated on April 17, 2014 at 1:21 EDT

Latest Computer crimes Stories

2013-03-06 00:22:14

New Microsoft-commissioned study also highlights dangers for those that use counterfeit software. REDMOND, Wash., March 6, 2013 /PRNewswire/ -- Although some computer users may actively seek pirated software in hopes of saving money, the chances of infection by unexpected malware are one in three for consumers and three in 10 for businesses, according to a new study commissioned by Microsoft Corp. and conducted by IDC. As a result of these infections, the research shows...

2013-03-05 12:21:53

NEW YORK, March 5, 2013 /PRNewswire/ -- Waterfall Security Solutions, the leading provider of Unidirectional Security Gateways, and AID Corporation, a leading systems integrator with headquarters in Seoul, today announced the successful installation of Waterfall's Unidirectional Security Gateways at a Korean nuclear generator. "Waterfall is very pleased with the reception we have had from Korean critical infrastructures" said Lior Frenkel, CEO and Co-Founder of Waterfall...

2013-03-04 08:29:20

KENNEDY SPACE CENTER, Fla., March 4, 2013 /PRNewswire/ -- The nation's Healthcare and Public Health Critical Infrastructure has advanced cybersecurity resilience by uniting health sector owners and operators with other national critical infrastructures and government to implement the National Healthcare and Public Health (HPH) Cybersecurity Response System. The nation's HPH critical infrastructure includes physical and virtual assets, systems, networks, devices and the data that resides...

Cyber-Attacks Against China Most Often Blamed On US
2013-03-01 11:14:20

Michael Harper for redOrbit.com — Your Universe Online Last month, American security firm Mandiant released a report which claimed China's military was behind more than 100 attacks against US companies spanning 6 years. China's Ministry of National Defense has now returned fire, saying that two-thirds of the attacks in their country have originated in the US. The Ministry of Defense (MOD) released a statement yesterday claiming that they have seen, on average, 144,000 attacks...

2013-02-28 23:04:17

Recent Cyber Espionage attacks and global menace of malware programs has created lot of problems for enterprise and SOHO users. There is a strong requirement to choose right security software to protect financial details, personal data and other sensitive information Dubai, UAE (PRWEB) February 28, 2013 Recently several cyber security companies issued a report and found several complicated espionage setups in various countries targeting European and American government, diplomatic...

2013-02-28 23:00:14

Read on to learn more about all the benefits of the new site and how to get your most pressing Cyber Security challenges solved. Washington, D.C. (PRWEB) February 28, 2013 Wilson Innovative Solutions LLC is pleased to announce the release of the Cyber Security Resource center. Cyber Security Resources is an information portal for all things cyber security. The portal currently features a Q&A forum where visitors can ask ANY cyber security question and have their question answered within...

2013-02-26 08:35:47

Easy Solutions Total Fraud Protection® Platform Now Available to Dunbar Clients SAN FRANCISCO, Feb. 26, 2013 /PRNewswire/ -- RSA Conference Booth #2258 - Easy Solutions, the Total Fraud Protection® company, today announced that Dunbar, The Most Trusted Name In Security(®), has selected Easy Solutions as a strategic technology partner for their new Dunbar Digital Armor offering. The newest addition to the Dunbar family of companies, Dunbar Digital Armor has been created...

2013-02-25 23:04:00

Using Persona ID Rules, Companies Now Gain a Comprehensive View into Fraud and Security San Jose, CA (PRWEB) February 25, 2013 ThreatMetrix, the fastest-growing provider of integrated cybercrime prevention solutions, today announced the introduction of behavioral analysis in the ThreatMetrix Cybercrime Defender Platform via the ThreatMetrix Persona ID Rules, enabling real-time linkage of a current transaction to related transactions through a matrix of attributes associated to the visitor,...

2013-02-25 16:28:35

Former White House Cybersecurity Advisor Brings More than 40 Years of International Security Expertise to Leadership of Software Security Industry Group SAN FRANCISCO, Feb. 25, 2013 /PRNewswire/ -- (RSA Conference) -- The Software Assurance Forum for Excellence in Code (SAFECode), a non-profit organization dedicated to increasing trust in information and communications technology products and services through the advancement of effective security assurance methods, today...

2013-02-22 23:03:00

Most of the time organizations like to stay as hush-hush as possible when it comes to being the victim of a cyber attack, but sometimes, the victim has the weaponry to send a salvo of their own in retaliation, as is the case with The New York Times and their global megaphone. To Global Digital Forensics founder, Joe Caruso, “This type of high profile exposé should be a lesson that every US organization with a digital presence should not only take to heart, but take action on as...