Similar Articles |
|
InternetNews January 28, 2009 Richard Adhikari |
Online Trust: A Thing of the Past? Malware attacks are turning the Web upside down, and complicating the efforts of security vendors and users to cope with the threats. |
InternetNews February 25, 2010 |
Malware Thrives Despite Improved Security: IBM Security researchers at IBM's X-Force find 6,601 new software vulnerabilities in 2009, down 11 percent from last, but that hasn't stopped hackers and phishers from finding new ways to rip off consumers. |
InternetNews August 10, 2009 |
IBM Adds Web App Defense to Security Portfolio IBM today unveiled new enhancements to its security suite aimed at safeguarding Web applications and data, as attacks preying on such targets continue to dominate the headlines. |
InternetNews August 27, 2009 |
IBM's X-Force Report Praises Sun for Fast Fixes Security report on trends in vulnerabilities, threats, spam, and phishing finds Sun has passed Microsoft in terms of reporting and fixing OS problems. |
InternetNews March 30, 2010 |
IBM to Help Defend FAA From Cyber Attacks IBM will test a new system to monitor and safeguard the FAA's networks against hackers, data theft and malware. |
InternetNews April 21, 2009 Alex Goldman |
IBM Says Cloud, Virtualized Tech Need Lockdown In their haste to embrace the latest technologies, many enterprises have architected new security holes in their networks, IBM warns. |
InternetNews June 22, 2010 |
Botnet Still King of Malware Underworld Latest report from Gartner finds that while more sophisticated malware and phishing scams will proliferate, botnets will still be the top challenge for security experts for the foreseeable future. |
InternetNews February 9, 2010 |
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
InternetNews February 2, 2009 Richard Adhikari |
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. |
InternetNews October 27, 2010 |
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. |
InternetNews November 17, 2009 |
McAfee Outlines Growing Cyber Warfare Threat McAfee's study finds politically motivated cyber attacks are on the rise internationally. |
InternetNews February 4, 2010 |
Air Force Taps Big Blue for Cloud Project IBM will embark on a 10-month project with the Air Force to build a secure, high-level defense network in the cloud. |
InternetNews October 6, 2008 Richard Adhikari |
IBM Puts More Tools in the Cloud IBM has launched an initiative that offers up a mix of on-premise and cloud computing applications to help its ISVs and partners offer those services to customers. |
InternetNews March 31, 2011 |
Report: Nearly Half of Vulnerabilities Left Unpatched IBM's X-Force 2010 Trend and Risk Report details a 27 percent rise in vulnerabilities, with nearly half left unpatched by year's end. |
InternetNews July 28, 2010 |
Cyberattacks Hit Businesses With Big Bills New study from Ponemon Institute and security vendor ArcSight details rising cost of cyber-attacks, with businesses reporting at least one major attack a week. |
InternetNews November 29, 2007 Andy Patrizio |
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. |
InternetNews September 1, 2010 |
IBM Talks Up Enterprise Cloud Plans, Benefits IBM drops details on its efforts to build and buy cloud products and services tailored for for uses like compliance, collaboration and communications across an array of industries. |
InternetNews February 10, 2009 Richard Adhikari |
IBM Talks Up Private-Public Cloud Migration IBM shores up its cloud business and teams with Juniper on migrating enterprise loads to public clouds. |
InternetNews February 24, 2010 |
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. |
InternetNews October 8, 2010 |
Cloud, Mobile Top Developers' Priorities: IBM In a new survey, IBM's developerWorks unit has found that more than half of IT professionals expect mobile software applications to vault past conventional computing platforms in the next five years. |
InternetNews February 17, 2009 Sean Gallagher |
Social Networks a Magnet for Malware Just like the crooks robbed the banks because that's where the money is, malware will go where the people are. |
InternetNews November 1, 2007 Sean Michael Kerner |
IBM: Security Is Our Brand Big Blue says it's baking security awareness into every facet of its business - and if it's lucky, perhaps yours soon, too. |
InternetNews January 24, 2006 Sean Michael Kerner |
IBM: Users Are The Weak Link in Security IBM is warning in a new report that, though widespread virus outbreaks are on the decline, on the whole online attacks are expected to rise in 2006. The culprit? Highly targeted attacks that rely on naive users to help perpetrate cybercrimes. |
InternetNews July 13, 2009 |
F-Secure: Flash, ActiveX Still Under Attack Anyone who has downloaded the latest version of Firefox should make sure to update all browser plugins. |
InternetNews June 15, 2009 Alex Goldman |
IBM's Cloud Computing Starts With Developers IBM's CloudBurst and Smart Business products recognize that today's businesses focus on developing and deploying software fast, cheaply, and with as few bugs as possible. |
InternetNews July 14, 2006 Clint Boulton |
IBM Gives Micromuse Assets The Tivoli Touch Designed for businesses with heavy computer data traffic, IBM Tivoli Security Operations Manager protects networks by proactively detecting and neutralizing security threats as they happen rather than after the system is harmed. |
InternetNews May 13, 2010 |
One Gang Responsible For Most Phishing Attacks More than two-thirds of all phishing attacks in the second half of 2009 were the work of one gang, according to an anti-phishing group. |
InternetNews April 14, 2009 Alex Goldman |
Credit Cards, Banks Targeted by Cyber Criminals Sophisticated criminal gangs are organized and focused on stealing, buying and selling identities across shadowy online markets. |
InternetNews September 17, 2007 Andy Patrizio |
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds. |
InternetNews May 6, 2005 Clint Boulton |
Is Creative Computing Gridlocked? IBM and Sun are headed for a showdown as they try to create new pricing schemes, experts say. |
Registered Rep. August 15, 2014 Diana Britton |
Is the Cyber Sweep Too Much to Handle? The recent regulatory sweeps around cyber security by the Securities and Exchange Commission and FINRA are starting to hit financial advisors, and many, especially smaller practices, are not prepared for it. |
InternetNews March 13, 2008 Kenneth Corbin |
IBM Aims to 'SMash' Web 2.0 Threats IBM today announced a technology to secure enterprise mashups - the applications built from cobbling together data from multiple sources. |
InternetNews November 20, 2009 |
Symantec's 'Unlucky 13' Security Trends for 2010 Hackers and malware purveyors are becoming more sophisticated, meaning computer users need to become wiser and more proactive, too. |
InternetNews February 16, 2006 Tim Scannell |
IBM Takes Holistic Security Stance IBM Corp. this week restructured nearly its entire portfolio of security products and services to provide a more strategic and proactive approach to protecting computer systems and users from abuse, unauthorized access and identity theft. |
The Motley Fool October 5, 2009 Anders Bylund |
You've Got Cloud-Mail From IBM Big Blue is going toe-to-toe with both Google and Microsoft through its latest cloud-computing product. |
InternetNews March 2, 2009 Sean Gallagher |
IBM Sows Seeds for a Future Cloud IBM's university research efforts around cloud computing are advancing technology - and producing a crop of software engineers raised on IBM tools. |
InternetNews April 20, 2010 |
Targeted, DIY Malware Here to Stay: Symantec Symantec's latest threat report provides plenty of disconcerting news for IT managers charged with safeguarding critical enterprise data. |
InternetNews August 25, 2010 |
More Security Holes in Software, Fewer Patches According to IBM's X-Force security research group, vulnerabilities are proliferating, and while companies are getting better about reporting those flaws, the number of unpatched problems continues to rise. |
InternetNews May 23, 2006 Clint Boulton |
IBM Powers Up SOA Machines IBM has taken some of its hardware and software technology and applied it to three appliances designed to secure and improve the performance of service-oriented architectures. |
InternetNews November 15, 2007 |
IBM in Push to Build Datacenters For Clients IBM is staking out a major new source of business helping clients like banks or retailers manage datacenters on a par with Internet players such as Google or Microsoft, a top official said on Wednesday. |
National Defense July 2007 Breanne Wagner |
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses. |
InternetNews November 16, 2009 |
IBM Rolls Out BI for Private Clouds Smart Analytics Cloud will provide more than a petabyte of data to its 200,000 employees. |
InternetNews March 31, 2010 |
Black Market Spawns Cyber Crime for Dummies New study from PandaLabs pins the escalating severity of attacks carried out by relatively unskilled hackers on a thriving black market offering ready-made tools. |
InternetNews July 28, 2010 |
Most Data Breaches Perpetrated by Cyber Gangs Organized crime syndicates, many of them based or operated from outside the U.S., are overwhelmingly to blame for coordinated cyber attacks, according to a study by Verizon and the U.S. Secret Service. |
InternetNews March 23, 2006 Clint Boulton |
Sun's Grid DDOS-Attacked Sun's public grid launch was hampered by denial-of-service attacks on the company's grid pilot. |
InternetNews June 23, 2006 David Needle |
IBM Grows Grid Iron There's growth in grids. IBM said in response to increasing worldwide demand for supercomputing resources, it is expanding the availability of computer resources available through its computing on demand program. |
The Motley Fool July 28, 2010 Gabriel Perna |
IBM Top-Rated in Cloud Offerings IBM's experience and diverse supports have helped its success in the cloud. |
InternetNews December 26, 2008 Richard Adhikari |
Enterprise Opportunities & Challenges in 2009 Money-saving technologies will be strong, cybercriminals will rev up and business intelligence solutions will spread. |
Insurance & Technology November 5, 2008 Prasad Balakrishnan |
Cyber Attacks Can Come in Many Shapes and Sizes Cyber threats aimed at insurance companies are constantly evolving and growing. Unfortunately the pace of adoption of cyber protection mechanisms has not caught up. |