Kaspersky Lab remembers ‘benign’ malware
In the history of malware writing and malware hunting, there are a number of unusual stories involving programmes which looked like typical malware - but did nothing more damaging than putting a smile on users’ faces. In a few extraordinary cases, viruses were even...
Panda Security named visionary by Gartner
The latest Gartner Magic Quadrant report for Endpoint Protection Platforms (EPP) was published early this year. The report, which assesses security vendors according to their products, vision and execution, describes Panda Security as a Visionary in the security...
Kaspersky offers interactive cyberthreat map
Kaspersky Lab has launched an interactive cyberthreat map that visualises cyber security incidents occurring worldwide in realtime. The types of threats displayed include malicious objects detected during on-access and on-demand scans, e-mail and Web antivirus...
Trend Micro grows cloud security solutions
Reinforcing on-going support of the AWS shared security model, Trend Micro Incorporated, an AWS (Amazon Web Services) Advanced Technology Partner and global leader in cloud security, announced at the AWS Summit 2014 new initiatives that will help organisations fulfil...
Fortinet delivers FortiGate for AWS
Fortinet has announced that the company’s flagship award-winning FortiGate security platform is now available on Amazon Web Services (AWS), a division of Amazon.com, in the AWS Marketplace. FortiGate-VM is strategically designed to help customers better mitigate...
Check Point achieves 99,83% catch rate
Check Point Software Technologies has announced that Check Point Threat Emulation Service, which protects organisations against new, unknown and targeted attacks before they infect a network, has the highest catch rate of malicious files. In recent benchmark testing,...
Protecting against CryptoLocker
Today, most businesses are run on computers. Owning a computer, accessing e-mails, surfing the Internet, interacting on social media sites and being connected to a network all carry the threat of attacks from malicious programmes and viruses, says Roberto Caprio, MD,...
Always-on SSL ensures Web site security
Web sites have been using SSL technology for years to ensure their security, and the certificates and their uses are well understood. SSL that only protects users at login, however, leaves them vulnerable when they’re spending time on your Web site. Says LAWtrust...
ARM, NetClean fight child exploitation
Cybercrime is not new, and organisations across the globe have tools and systems in place to defend their networks against these crooks. However, there are far worse offenders out there. Ones that aren’t interested in stealing your money or intellectual property, they...
Sophos offers threat protection for SMEs
Sophos has updated its unified threat management solution, Sophos UTM. With more than 100 new features, the highlight of the new UTM platform is bringing Advanced Threat Protection (ATP) to the small and mid-market, capabilities that were previously only available to...
CCTV monitoring in poor bandwidth conditions
The South African farming community faces a number of unique challenges. The very nature of farms, which can comprise of hundreds or even thousands of hectares of geographically dispersed land, makes monitoring them a difficult task, even when the farm owner or...
ESET launches Cyber Security for Mac
ESET Southern Africa has announced the release of brand new and improved ESET Cyber Security Pro and ESET Cyber Security. Both products come with added layers of protection to Apple’s built in Internet security features. Key new functionalities include: new...