Tags : malware


Juniper Report: Mobile Malware Rising Rapidly


[February 24, 2012]

Vendor’s 2011 Mobile Threats Report shows 155 percent spike in mobile malware across multiple devices. Android malware jumps 3,325 percent from June to end of year.

Read More...

Tags: security , Android , mobile , malware , spyware , Juniper Networks

Smartphone Users Largely Unaware of Mobile Security Risks, Study Says


[February 21, 2011] Smartphone Users Largely Unaware of Mobile Security Risks, Study Says Read More...

Tags: security , mobile , smartphone , malware , anti-virus , AVG , Ponemon Institute

Websense Offers Top Five Security Predictions for 2011


[December 24, 2010] Web security vendor predicts more, bigger, badder threats in 2011, sees social media, mobile applications as likely targets for cybercriminals. Read More...

Tags: security , mobile , malware , Websense , threat

Symantec Offers Single Licensing and Management Model for Physical and Virtual Environments


[December 05, 2010] Symantec Offers Single Licensing and Management Model for Physical and Virtual Environments Read More...

Tags: security , virtualization , Symantec , malware , antivirus

Daily Malware Threats Rise Nearly 15 Percent in 2010


[November 30, 2010] PandaLabs reports that one-third of all active malware threats were created in the first 10 months of the year. Read More...

Tags: security , malware , PandaLabs , antivirus , Panda Security

Panda Offers Six Online Security Tips To Holiday Shoppers


[November 29, 2010] Panda Offers Six Online Security Tips To Holiday Shoppers Read More...

Tags: security , malware , PandaLabs , scam , online shopping , Panda Security , holiday season

McAfee Reports Malware Reaches New Highs


[August 16, 2010] McAfee Reports Malware Reaches New Highs Read More...

Tags: Symantec , malware , cyber crime , McAfee , Sophos

Sophos-At-Bristol


[April 16, 2010] The challenges being faced by At-Bristol were similar to other facilities that contain public computers. While certain Web sites are blocked, At-Bristol’s computer users are essentially free to search for any information they wish. Computers were routinely becoming infected with viruses, spyware, and other malware as a result. Read More...

Tags: security , search , vertical , malware , e-Mail

Sophos-Under Armour


[April 16, 2010] The main challenge Under Armour was facing was that their endpoint solution was difficult to manage and had several limitations, one of them being that unwanted applications could not be blocked or prevented from launching. The company wanted a solution that would offer better security, enhanced data control, and improved threat protection. Read More...

Tags: security , management , vertical , IT , malware

Astaro-eEye Digital Security


[March 16, 2010] The main difficulty faced by eEye employees before the Astaro solution was implemented was spam. Too many of these e-mails were getting through to employees, which was both reducing productivity and causing a shortage of storage space on exchange servers. Spam messages in the form of phishing attacks were increasing the amount of spyware and malware on the network. Read More...

Tags: security , vertical , malware , e-Mail , Storage

Managed Security Service Market Offers VARs Promise


[July 30, 2009] Increased security efforts in key vertical markets and slew of compliance issues help drive MSSP demand. Read More...

Tags: services , malware , data security , managed services , VARs

Trend Micro


[February 18, 2009] The two-tier (Vantage Partner, SecureONE Partner) Trend Micro Partner Program offers benefits including marketing collateral, technical support, sales and technical training and certification, and more. Read More...

Tags: security , malware , Trend Micro , antivirus

Walsh to Tout CA's 'Most Wanted' Malware


[November 26, 2008] TV personality is the public face of CA's updated online security software suite. Read More...

Tags: security , malware , CA , antivirus , John Walsh

Panda Embraces Channel with New Security-as-a-Service Solution


[November 12, 2008] New offering allows channel partners to provide a cost-effective security service to the SMB space. Vendor is preparing a rollout in North American market. Read More...

Tags: security , server , malware , antivirus , Panda Security

Adobe Sites Hit by Malware


[October 17, 2008] Security firm finds two sites were compromised by an SQL injection. Read More...

Tags: security , Google , malware , botnet , Adobe

Fake FedEx E-mails Flood the Web


[August 22, 2008] Spammers rev up to unprecedented volumes. Read More...

Tags: security , malware , botnet , e-Mail

Panda Security Offers VARs Improved Program and Margins


[August 12, 2008] Determined to win a bigger slice of the U.S. market for security products and services, Panda Security has launched a three-pronged channel program -- covering a portfolio of software solutions, appliances, and a hosted offering –- that promises resellers net margins of 20 percent or more. Read More...

Tags: cloud computing , security , software , marketing , malware

VARs Can Profit from the Security Challenge


[July 24, 2008] Dave Allison, vice president of channel sales at Kaspersky Lab Americas, explains how channel partners can capitalize on the growing need for security by evolving customers' security processes and recommending solutions specifically tailored to their needs. Read More...

Tags: security , services , malware , policy , Storage

Lessons From McAfee's S.P.A.M. Experiment


[July 02, 2008] Beyond don't open spam, the company finds that mobile phones are the new target, and guess which country is the second-largest target after the U.S.? Read More...

Tags: security , spam , software , Dell , malware

Channel Is Key In Enterprise Security Sales


[April 06, 2008] George Adams, CEO of SSH Communications Security, outlines the key obstacles channel partners face in tackling security sales and offers a roadmap to success. Read More...

Tags: Linux , authentication , Windows , security , data , search , services , Microsoft , server , consumer , management , support , IBM , Specification , Demo , PC , IT , Internet , research , marketing , privacy , ERP , laptops , Office , malware , CA , government , virus , Enterprise , OS , technology , RIM , business , news , SEC , corporate , VAR , protocols , standards , regulation , OSI , REV , EFF , vulnerabilities , SCO

Is The Storm Worm Finally Blowing Over?


[March 07, 2008] Spam report from Marshal says yes, other security vendors have their doubts. Read More...

Tags: security , software , malware , e-Mail , Storm worm

Teleworkers Feel Safe, Threaten Network Security


[February 06, 2008] Study finds remote workers jeopardize their corporate networks with unsafe activities -- while ironically believing the Internet is getting safer. Read More...

Tags: security , wireless , Cisco , malware , Storm worm

Storm's Creators Face a Storm of Their Own


[January 30, 2008] Law enforcement knows who created one of the worst worms to hit the Internet. The hard part is arresting them. Read More...

Tags: malware , Storm worm , extradition , St. Petersburg , Pinch worm


Click the Join button below to sign up to our newsletter!