|Смотрите также связанные темы|
09.04.2018 Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA Adaptive Security Appliance and Cisco PIX Security Appliances
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA AdaptiveSecurity Appliance and Cisco PIX Security AppliancesAdvisory ID: cisco-sa-20090408-asahttp://www.cisco.com/warp/public/707/cisco-sa-20090408-asa.shtmlRevision 1.0For Public Release 2009 April 08 1600 UTC (GMT)Summary=======Multiple vulnerabilities exist in the Cisco ASA 5500 Series AdaptiveSecurity Appliances and Cisco PIX Security Appliances. This securityadvisory outlines the details of these vulnerabilities: * VPN Authentication Bypass when Account Override F...
26.05.2018 Kerio Selects Sophos As Its New Anti-Malware Technology Partner
SAN JOSE, California –May 26, 2010– Kerio Technologies, a leading innovator in global messaging and IT security, today announced that it has partnered with IT security and data protection firm Sophos to provide pro-active anti-malware protection for its new technology to complement existing layers of security in Kerio’s unified threat management (UTM) and groupware products.
03.09.2018 Anti-Malware.ru протестировал быстродействие антивирусов
Российский независимый информационно-аналитический портал Anti-Malware.ru опубликовал результаты первого в своем роде сравнительного теста антивирусов на быстродействие и потребление системных ресурсов. Далее
09.09.2018 Reinventing computer security
We announced an exciting new technology today that changes the way computers are protected against malware, significantly increasing the level of computer security.
The new McAfee Artemis Technology uses a new service hosted in the cloud by our Avert Labs to provide protection in milliseconds when a computer gets hit by suspicious computer code. That’s a [...]
25.10.2018 Mobile Phones Are Vulnerable to Attack
We just posted a new feature article on the McAfee Security Advice Center called: Tips for Safeguarding Your Mobile Phone from Malware.
Check it out and you’ll find 8 tips to keep your mobile device safe from cyber attacks.
Also, you will find an invitation to download a new product called McAfee Mobile Anti-Theft (BETA) - [...]
31.10.2018 Another Record Quarter for McAfee
Yesterday we announced our financial results for Q3 08. We are pleased to report that despite the current economic environment, our customers continue to view our technology as a “must-have.” Our relentless focus on security leadership has enabled us to provide our customers with innovative technology in a growing threat environment, increased manageability and an [...]
04.11.2018 Why Does Japan Have 10x Fewer PC Infections the U.S.?
I read the New York Times article today titled “On Security, Microsoft Reports Progress and Alarm” and was quite intrigued by the closing paragraph that talked about malware infection rates in different countries. According to the article, Japan had the lowest rate of 1.8 for every 1,000 PCs, while the U.S. was back in [...]
17.11.2018 The Net’s A Bit Safer Without McColo
The Internet got a little safer last week because Internet access providers pulled the plug, literally, on a company called McColo.
This is a moment in the fight against cybercrime that we can celebrate. It came about thanks to the important contributions of security researchers and media covering the matter. The research provides us with insight [...]
19.01.2018 Cisco Security Response: Cisco IOS Cross-Site Scripting Vulnerabilities
Two separate Cisco IOS Hypertext Transfer Protocol (HTTP) cross-site scripting (XSS) vulnerabilities have been reported to Cisco by two independent researchers.
05.02.2018 Is information security compliance really a cost center?
No. Absolutely and unequivocally not. I am drawing the line in the sand. Business leaders need to understand there is no more need for proper security to justify itself over and over again. It saves you time and money (period).
Properly implemented information security provides business process improvement, technology improvement and threat reduction. Compliance controls that [...]