Protecting data files through backup or mirroring procedures is an important, but mundane, part of enterprise IT life. Catalogic believes that its approach to this process could both make life easier for IT administrators and offer enterprises greater insight into its data and how it is being used.
Showing results 1 to 20 of 329
Increasing security breaches indicate that any data, once online, will never be completely safe from theft and malicious attacks, so enterprises and users may be better off focusing on risk mitigation.
Windows 10 will build in standards-based two-factor authentication to every device, effectively neutering most phishing attacks and password database breaches. The company also announced new features aimed at securing corporate machines from malware attacks and data leaks.
Yahoo says no customer data was placed at risk after servers were infiltrated by malware -- and the insidious Shellshock bug was not at fault.
"SynoLocker" malware infects through a vulnerability in older versions of their NAS software. The attack demands 0.6 BitCoins (about $350) to decrypt files.
Firefox has blocked known phishing and malware sites for some time. Now it will check reputation on individual files and soon use file signatures.
This offers AWS customers in the region a variety of security modules, such as data encryption, firewall, anti-malware, web reputation and integrity monitoring, and compliance controls.
Anyone who shopped for LaCie products in the last year could be at risk.
With larger and more frequent data breaches, online scammers are able to rely on existing techniques, and have no need yet to move into the realm of mobile malware.
One of the challenges of using Cloud-based big data or media applications is moving big files and objects into the cloud. IBM acquired Aspera just to address this issue. Signiant, long a player in broadcast and other media, says don't forget us.
ThreatData essentially pools data related to malware, phishing, and other online risks across the Internet for both real-time and long-term analysis.
Malicious RTF files could execute code. Microsoft has released a "Fix it" temporary workaround which disables RTF support in Word.
Personal cloud services, portable storage devices, and email are a company's worst enemies. Malware is much less of a problem than once thought.
A confidential U.S. government report indicates that the Target data breaches were tied to a broader effort against retailers. New malicious software called KAPTOXA led the attacks.
According to new research, enterprise malware analysts often address data breaches which are kept under wraps by companies.
There are still a number of blanks on the S-1 -- namely the initial stock price, the number of shares to be sold, and which stock exchange on which Nimble plans to be listed.
The first flagship BlackBerry 10 phone contains a "critical" bug that could allow hackers to crack open the device and pilfer files and data.
Malwarebytes has launched a backup service that includes scanning files for malware. It backs up multiple Windows PCs, and Android and Apple iOS devices, with optional encryption to protect your files in the cloud.
Despite Microsoft's response to the rise of AutoRun malware infections in February, 2011, according to ESET's recently released telemetry data for 2012, the infection vector tops their chart for a second year in a row.
Sophos' antivirus solution began marking its own updates as false-positive malware, which deleted critical files in the system's live protection program.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)