Industry News

Enterprise Anti-Virus Protection - Analyst Report by Dennis Technology Labs

virus Resources on TechRepublic - Tue, 04/09/2013 - 03:00
The results are in. Symantec Endpoint Protection rated best overall in total accuracy in independent, real-world tests recently published by Dennis Technology Labs.This report by Dennis Technology Labs aims to compare the effectiveness of anti-malware products provided by well-known security companies.The products were exposed to internet threats that were live during the test period. This...

A Newbie

virus Resources on TechRepublic - Mon, 04/01/2013 - 03:10
A NewbieHello friendsMy name is Mario Hartmann I am a new user to this forum have more interest on participating in this discussion board so I am here to gain and share so many knowledge from the experts. Hope for better stay here.Thank you

Malware Classification Through HEX Conversion and Mining

virus Resources on TechRepublic - Mon, 04/01/2013 - 03:00
The malicious codes are normally referred as malware. Systems are vulnerable to the traditional attacks, and attackers continue to find new ways around existing protection mechanisms in order to execute their injected code. Malware is a pervasive problem in distributed computer and network systems. These new malicious executables are created at the rate of thousands every year. There are...

An Overview & Analysis Safety Proposal And Policies Of Internet Network Safety

virus Resources on TechRepublic - Mon, 04/01/2013 - 03:00
Now-a-days network safety is very crucial and protected opinion, to determine virus. The review of the process of network safety policies to the private network connected to the internet & information networks. The network safety define such as like emphasis on an e-business, sound network safety, computer system safety as the technological information to protect hardware, software, and data...

Prevention Proposals for Threats in Internet Services

virus Resources on TechRepublic - Mon, 04/01/2013 - 03:00
The explosion of the public Internet and e-commerce, private computers, and computer networks, if not adequately secured, are increasingly vulnerable to damaging attacks. Hackers, viruses, vindictive employees and even human error all represent clear and present dangers to networks. Loss of irreplaceable data is a very real threat for any business owner whose network connects to the outside...

Intelligence Driven Computer Network Defence By Intrusion Kill Chain

virus Resources on TechRepublic - Mon, 04/01/2013 - 03:00
Conventional network defense tools such as intrusion detection systems and anti-virus focus on the vulnerability component of risk, and traditional incident response methodology presupposes a successful intrusion. An evolution in the goals and sophistication of computer network intrusions has rendered these approaches insufficient for certain actors. A new class of threats, appropriately...

McAfee Explains how to Neutralise Advanced Malware

virus Resources on TechRepublic - Fri, 03/22/2013 - 03:00
Today's malware is a malleable tool in the hands of a clever cybercriminal who uses it to attack through vulnerabilities that standard antivirus solutions don't monitor or aren't designed to catch. This whitepaper explains how existing anti-malware in endpoints and the network must change to better detect, block, analyse, and respond to the full range of advanced malware, and form part of a...

McAfee Explains how to Neutralize Advanced Malware

virus Resources on TechRepublic - Fri, 03/22/2013 - 03:00
Today's malware is a malleable tool in the hands of a clever cybercriminal who uses it to attack through vulnerabilities that standard antivirus solutions don't monitor or aren't designed to catch. This whitepaper explains how existing antimalware in endpoints and the network must change to better detect, block, analyse, and respond to the full range of advanced malware, and form part of a...

Secure Web Gateways Buyer's Guide

virus Resources on TechRepublic - Tue, 03/19/2013 - 03:00
The web is the number one source for malware distribution. With more than 2 million new pages added every day and 10,000 new malicious Web sites found on a daily basis, how do you keep up with the volume, not to mention the increasing sophistication of all these web-based threats? If you are like most organizations, you are looking to shore up or transition from legacy solutions, such as URL...

Longline Phishing - Email-borne Threats, Cloud Computing, Big Data, and the Rise of Industrial Phishing Attacks

virus Resources on TechRepublic - Mon, 03/18/2013 - 03:00
The last few years have seen a dramatic increase in the use of email as a vehicle for cyberattacks on organizations and large corporations. Such attacks have evolved from the simple inclusion of malware as a non-disguised executable file, to more socially engineered 'phishing' style attacks, which attempt to persuade the recipient to activate malware or voluntarily provide valid security...

Longline Phishing

virus Resources on TechRepublic - Mon, 03/18/2013 - 03:00
The last few years have seen a dramatic increase in the use of email as a vehicle for cyberattacks on organizations and large corporations. Such attacks have evolved from the simple inclusion of malware as a non-disguised executable file, to more socially engineered 'phishing' style attacks, which attempt to persuade the recipient to activate malware or voluntarily provide valid security...

Longline Phishing

virus Resources on TechRepublic - Mon, 03/18/2013 - 03:00
The last few years have seen a dramatic increase in the use of email as a vehicle for cyberat¬tacks on organizations and large corporations. Such attacks have evolved from the simple inclusion of malware as a non-disguised executable file, to more socially engineered 'phish¬ing' style attacks, which attempt to persuade the recipient to activate malware or voluntarily provide valid security...

Keeping distributed endpoints safe and secure

virus Resources on TechRepublic - Wed, 02/27/2013 - 04:00
In today’s far-reaching environments, where the numbers and varieties of servers, desktops, laptops, mobile devices and specialized equipment such as point-of-sale (POS) devices, ATMs and self-service kiosks—known collectively as “endpoints”—are growing at unprecedented rates, traditional protection schemes such as firewalls and anti-virus agents are no longer sufficient on their own. With...

2012 IBM X-Force Mid Year Trend and Risk Report

virus Resources on TechRepublic - Wed, 02/27/2013 - 04:00
The IBM X-Force Trend and Risk Report is produced twice per year: once at mid-year and once at year-end. This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. They are intended to help customers, fellow...

Five enterprise-ready antivirus systems

virus Resources on TechRepublic - Tue, 02/26/2013 - 14:21
Wally Bahny examines five enterprise grade antivirus systems that you may have overlooked.

Parallels Workstation Extreme and the company's view on hosted virtual desktop

Virtualization Report - Thu, 04/02/2009 - 20:41
Parallels is in the news this week. The company just announced its new Workstation Extreme product, working with Intel, HP and NVIDIA to deliver a powerful desktop or workstation experience to the user. The company is leveraging pass through video, something I've been looking forward to for years now. And while speaking to Parallels, I also got their CEO's take on the recent news coming out of Gartner. The analyst firm stated that it expects the hosted virtual desktop market to explode to a whopping $65 billion in 2013. So where does Parallels see themselves in this market?   LISTEN!... READ MORE

Citrix goes mobile on the Apple iPhone

Virtualization Report - Tue, 03/31/2009 - 08:30
Are we moving to a mobile management world? Citrix just released a free preview version of its mobile application, Receiver, for XenApp READ MORE

Parallels gives 3-D graphics a boost within virtualization

Virtualization Report - Tue, 03/31/2009 - 07:00
Parallels Workstation Extreme offers individual graphics cards to multiple virtual machines READ MORE

Gartner looks for virtual desktop market to skyrocket

Virtualization Report - Mon, 03/30/2009 - 14:55
The hosted virtual desktop market is forecasted to reach 49 million units by 2013, according to analyst firm Gartner READ MORE

Advance your VMware knowledge with these three white papers

Virtualization Report - Mon, 03/30/2009 - 07:00
VMware has added three new white papers to the resource list that covers VMFS management, virtualizing Microsoft SQL Server, and learning more about VMware View Composer READ MORE