Quantcast

Latest Zero day attack Stories

2009-04-08 08:21:00

IT managers polled by Bit9 assert the need for greater protection against threats from unauthorized and malicious software WALTHAM, Mass., April 8 /PRNewswire/ -- Bit9, Inc., the pioneer and leader in Enterprise Application Whitelisting, today announced the results of a survey on the ubiquity of unauthorized software in enterprise and government systems. According to the survey of more than 250 IT managers, 77 percent of the respondents have software usage policies in place, yet an...

2009-03-04 09:03:00

WALTHAM, Mass., March 4 /PRNewswire/ -- Bit9, Inc., the pioneer and leader in Enterprise Application Whitelisting, announced today that Bertucci's has chosen Bit9 Parity(TM) to proactively protect its restaurant systems from malware, data leakage and unauthorized software. Bertucci's also is using Bit9 Parity application whitelisting to help achieve compliance with Payment Card Industry Data Security Standards (PCI DSS). (Logo: http://www.newscom.com/cgi-bin/prnh/20080204/BIT9LOGO ) With...

2009-02-25 15:50:00

Brings Application Whitelisting Expertise to 1.6M U.S. Retailers WALTHAM, Mass., Feb. 25 /PRNewswire/ -- Bit9, Inc., the pioneer and leader in Enterprise Application Whitelisting, announced today that it has joined the National Retail Federation (NRF) to become part of the world's largest retail trade association. Bit9 will bring to the NRF its application whitelisting expertise in helping retailers comply with PCI DSS regulations and secure sensitive information contained in retail...

2009-02-24 08:00:00

Triumfant Resolution Manager Enables Users to Stop Unknown Desktop Threats and Remove All Remnants of an Attack ROCKVILLE, Md., Feb. 24 /PRNewswire/ -- Triumfant(R), the industry pioneer in applying granular change detection to identifying and remediating malicious software, today announced a first-of-its-kind anti-malware solution that provides organizations with protection from zero-day attacks. Until now, traditional anti-virus solutions have been ineffective at identifying zero-day...

2008-12-11 15:25:00

OTTAWA and RESTON, Va., Dec. 11 /PRNewswire/ -- Third Brigade (http://www.thirdbrigade.com), experts in server and application protection, today announced that its customers which have deployed Third Brigade Deep Security are protected from attacks that could exploit a critical remote code execution vulnerability that exists in the Microsoft(R) Internet Explorer 7 browser. An attacker who successfully exploits this vulnerability could take complete control of an affected system. Trend...

fb8c396bb7198f8e9907ff39a027d9ee1
2008-07-29 13:30:00

New research shows that Internet hackers are narrowing the time frame they need to unleash computer attacks that take advantage of publicly disclosed security holes. Many sites are being compromised within 24 hours after a vulnerability is disclosed. IBM Corp.'s latest Internet Security Systems X-Force report said security flaws are being exploited in Web browsers, computer operating systems and other programs before many people even have had time to learn there's a problem. Released on...

2008-07-29 09:00:00

IBM (NYSE: IBM) today released results from its X-Force 2008 Midyear Trend Statistics report that indicates cyber-criminals are adopting new automation techniques and strategies that allow them to exploit vulnerabilities much faster than ever before. The new tools are being implemented on the Internet by organized criminal elements, and at the same time public exploit code published by researchers are putting more systems, databases and ultimately, people at risk of compromise. According to...


Word of the Day
negawatt
  • A unit of saved energy.
Coined by Amory Lovins, chairman of the Rocky Mountain Institute as a contraction of negative watt on the model of similar compounds like megawatt.