Quantcast
Last updated on April 18, 2014 at 1:21 EDT

Latest Computer network security Stories

2014-03-03 23:02:28

Uroburos - Highly Complex Spyware With Russian Roots Bochum, Germany (PRWEB) March 03, 2014 Security experts at G Data have discovered and analyzed highly sophisticated and complex spyware. This is designed to steal highly sensitive secret information from high potential networks such as national institutions, intelligence services or large corporations. The rootkit, called Uroburos, works autonomously and spreads in the infected networks on its own. Even computers that are not directly...

2014-03-03 08:39:37

WESTMINSTER, Colo., March 3, 2014 /PRNewswire/ -- Who: Kevin Koster Founder and CEO of Cloudpath Networks www.cloudpath.net Kevin Koster is the founder & CEO of Cloudpath Networks. Kevin created the paradigm of automated device onboarding for secure networks. He's spent more than 15 years on network security in the areas of 802.1X, access control, wireless and deployment...

2014-03-03 08:39:08

In its 10th installment, the 2014 Governance, Risk Management and Compliance Summit will be looking at numerous GRC topics facing corporate professionals and leading companies. ATLANTA, March 3, 2014 /PRNewswire/ -- The Holistic Information Security Practitioner Institute (HISPI) is proud to announce that its founder Taiye Lambo will be presenting some of its most valuable research - the Top 20 Mitigating Controls based on internationally accepted information security management...

2014-02-28 23:30:15

Using groundbreaking algorithms and exclusive hardware configurations, GigeNET offers automated DDoS monitoring and mitigation for cloud servers that come under attack. Chicago, IL (PRWEB) February 28, 2014 GigeNET renowned as a pioneer and leader in the detection and protection from distributed denial of service (DDoS) attacks, as well as managed hosting services, is headquartered just outside of Chicago, where it owns and operates a world-class 17,000 square foot datacenter. GigeNET...

2014-02-28 12:29:45

ABINGDON, England, February 28, 2014 /PRNewswire/ -- Kaspersky Lab has today published [http://www.securelist.com/en/analysis/204792327/Spam_report_January_2014 ] the results of the company's spam monitoring for January 2014. Top 3 stories in January: - Detection of emails claiming to be from the popular WhatsApp messenger for smartphones. The messages stated that an attached archive contained a photo from a "friend". The...

2014-02-27 23:23:48

Award Winners and Finalists Were Honored by Info Security Products Guide in San Francisco during the RSA Conference 2014 on February 24 San Jose, CA (PRWEB) February 27, 2014 ThreatMetrix™, the fastest-growing provider of context-based security and advanced fraud prevention solutions, today announces that Info Security Products Guide, the industry's leading information security research and advisory guide, named the company a Bronze winner in the 2014 Global Excellence Awards for...

2014-02-27 12:21:42

The two-channel AN/PRC-155 Manpack radio is a priority component of the Army's network modernization plan and essential to forces scheduled to receive Capability Set 14. SCOTTSDALE, Ariz., Feb. 27, 2014 /PRNewswire/ -- The two-channel AN/PRC-155 Manpack tactical networking radios will be included in U.S. Army's Capability Set (CS) 14, an integrated package of radios, satellite systems, software applications, smartphone-like devices and other network components. Units scheduled to...

2014-02-27 08:33:19

Entrust wins best fraud prevention, best multifactor solution categories at San Francisco event DALLAS, Feb. 27, 2014 /PRNewswire/ -- Entrust, Inc., a world leader in securing digital identities and information, won a pair of Reader Trust Awards during the SC Awards 2014 ceremony Tuesday night. Entrust TransactionGuard and Entrust IdentityGuard were honored as top products in the "Best Fraud Prevention Solution" and "Best Multifactor Solution" categories, respectively. The...

2014-02-27 04:20:42

ABINGDON, England, February 27, 2014 /PRNewswire/ -- Kaspersky Lab experts have today published the results of their analysis of the mobile threat landscape in 2013 [http://www.securelist.com/en/analysis/204792326/Mobile_Malware_Evolution_2013 ]. The analysis has revealed the following figures for 2013: - Nearly 145,000 new malicious programs for mobile devices were detected in 2013, which is more than three times the previous year's figure...

2014-02-26 23:27:49

Network operator Telefónica, and telecom suppliers Wind River and Netronome win Network Intelligence Awards for outstanding innovation and achievements based on network intelligence. Paris, France (PRWEB) February 26, 2014 The Network Intelligence Alliance (NI Alliance), an industry organization created for collaboration among the Network Economy’s technology providers, today announced the winners of its 2014 Network Intelligence (NI) Awards. These industry awards set out to...


Latest Computer network security Reference Libraries

25_edb73017b40afc155853d7b950ba54eb
2013-03-16 00:00:00

Wi-Fi, a trademark of the Wi-Fi Alliance, is not a technical term; however, the Alliance has used the term to describe only a narrow range of connectivity technologies including wireless local are network as well as PAN, LAN, and WAN. "IEEE 802.11", the technical term, has been used interchangeably with Wi-Fi even though Wi-Fi has become a superset of IEEE 802.11 over the past few years. It is used by over 700 million people and there are over 750,000 hotspots and around 800 million new Wi-Fi...

More Articles (1 articles) »