Смотрите также связанные темы 09.04.2018 Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA Adaptive Security Appliance and Cisco PIX Security Appliances -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA AdaptiveSecurity Appliance and Cisco PIX Security AppliancesAdvisory ID: cisco-sa-20090408-asahttp://www.cisco.com/warp/public/707/cisco-sa-20090408-asa.shtmlRevision 1.0For Public Release 2009 April 08 1600 UTC (GMT)Summary=======Multiple vulnerabilities exist in the Cisco ASA 5500 Series AdaptiveSecurity Appliances and Cisco PIX Security Appliances. This securityadvisory outlines the details of these vulnerabilities: * VPN Authentication Bypass when Account Override F...
06.08.2018 Android Backdoor disguised as a Kaspersky mobile security app This week, our virus lab handled a case where a customer received a phishing email with an Android Backdoor archive masquerading as a Kaspersky mobile security app.
04.03.2018 Kaspersky Mobile Security Lite Kaspersky Mobile Security Lite - комплексное антивирусное решение для мобильных устройств на базе операционной системы Android.
29.07.2018 Новости компании Agnitum (июль 2008)
04.06.2018 Kerio Executive to Lead Mobile Email Session at Microsoft Tech-Ed North America 2008 IT Professionals Conference SAN JOSE, CA--(Marketwire - June 4, 2008) - Kerio Technologies, Inc., a provider of award-winning internet security and messaging software, today announced it will lead a Birds-of-a-Feather session at Tech-Ed North America 2008 IT Professionals Conference. Attendees will learn how to have a collaboration-centric enterprise infrastructure that has the freedom to choose virtually any email and calendar application and be able to synchronize data throughout the organization.
WHAT: Birds-of-a-Feather (BOF) Session titled, "Extending the Desktop to Mobile Devices Anytime, Anywhere"
WHO: Chris Pel...
09.12.2018 Kaspersky Security Bulletin 2015. Развитие угроз в 2015 году Традиционно конец года – это время для размышлений, время для переосмысления жизни и мыслей о будущем. Мы бы хотели предложить наш обычный обзор основных событий, которые формировали ландшафт информационных угроз в 2015 г.
09.09.2018 Reinventing computer security We announced an exciting new technology today that changes the way computers are protected against malware, significantly increasing the level of computer security.
The new McAfee Artemis Technology uses a new service hosted in the cloud by our Avert Labs to provide protection in milliseconds when a computer gets hit by suspicious computer code. That’s a [...]
14.10.2018 Network Security Products Earn IPv6 Compliance Status Just recently, McAfee completed IPv6 compliance testing at the United States Joint Interoperability Test Command (JITC). The JITC is a US Department of Defense laboratory chartered to test Information Technologies and Information Assurance products to ensure operational effectiveness and suitability for the Defense Information Systems Agency and other DOD organizations.
McAfee specifically tested the I-2700 and [...]
25.10.2018 Mobile Phones Are Vulnerable to Attack We just posted a new feature article on the McAfee Security Advice Center called: Tips for Safeguarding Your Mobile Phone from Malware.
Check it out and you’ll find 8 tips to keep your mobile device safe from cyber attacks.
Also, you will find an invitation to download a new product called McAfee Mobile Anti-Theft (BETA) - [...]
27.10.2018 Consumerization Defines a New IT Security Reality According to Raghu Raghuram of VMware, 20-25% of users access enterprise services through private computers today. This proportion is growing quickly with mobile access, new service delivery strategies, and a Gen X/Y workforce molded by mobile devices and social networks.
Gartner has coined the term “consumerization” for the reality that unmanaged endpoints and consumer-based services have [...]
|