TechDay India - India's technology news network
India
Search

Cybercriminals stories - Page 17

Story image
Shock, horror: Mobility and social networking the new target for cyber miscreants
Wed, 12th Sep 2012
#
smartphones
#
email security
#
personal computing devices
Cyber miscreants are now targeting mobile phones and social networks, as Norton reports a twofold increase in threats compared to a year ago.
Story image
Free antivirus, firewall from Check Point
Wed, 2nd May 2012
#
firewalls
#
breach prevention
#
av
Check Point launches ZoneAlarm, a free antivirus and firewall bundle, aiming to enhance consumer cybersecurity with robust protection and cloud-based features.
Story image
Spam shrinks as scammers go social
Tue, 1st May 2012
#
cloud services
#
symantec
#
spam
Spam declines by 32%, but cyberattacks surge as scammers exploit social networks and mobile phones, says Symantec's 2011 report.
Story image
Web porn sites major security risk
Tue, 1st Mar 2011
#
malware
#
cybersecurity
#
cloud services
The lure of ‘adult’ content online continues to prove too strong for many people, despite the fact that a lot of these sites host malware.
Story image
Cybercrime: News is the new sex
Wed, 21st Jul 2010
#
malware
#
cybersecurity
#
facebook
Cybercriminals have shifted from sex scams to exploiting major news events, Symantec reveals, with World Cup-related frauds proliferating in 2010.
Story image
Cyber threats increase against Aussie SMBs
Tue, 8th Jun 2010
#
malware
#
cybersecurity
#
symantec
More than half of Australia's small businesses have been affected by cyber threats, according to a new survey.
Story image
Symantec unveils Norton Everywhere
Fri, 28th May 2010
#
smartphones
#
symantec
#
beta
Symantec's Norton Everywhere extends security beyond PCs to mobile and smart devices, offering new solutions like Norton Smartphone Security for Android Beta.
Story image
Locking the bathroom window
Sat, 1st May 2010
#
firewalls
#
data protection
#
network infrastructure
Endpoint security is crucial. Like securing bathroom windows in a house, neglecting PoS terminals and embedded devices leaves your network exposed.
Story image
Beware of phony friends
Sat, 1st May 2010
#
cloud services
#
facebook
#
twitter
As small businesses increasingly leverage social networks like Facebook and LinkedIn, the rise in phishing and cyberattacks demands vigilant security measures.
Story image
Bogus Chrome extension hosts malware
Tue, 20th Apr 2010
#
malware
#
cybersecurity
#
google
Spammers are targeting Google Chrome users this week,<br />infecting their systems with malware through a fake browser extension.
Story image
Symantec appoints ex-cybercrime prosecutor
Tue, 30th Mar 2010
#
symantec
#
online security
#
cybercrime
Adam Palmer has been named Norton Lead Cybersecurity Advisor who brings with him over ten years of experience in private industry and government service.
Story image
The scare factor
Tue, 1st Dec 2009
#
malware
#
phishing
#
physical security
Fake virus warnings are duping users into downloading scareware that installs malware and steals personal data, Symantec warns.
Story image
Google Wave used in malware scams
Fri, 6th Nov 2009
#
malware
#
cybersecurity
#
symantec
Scammers exploit Google Wave's popularity, using fake invite generators to distribute malware via forums and Twitter, warns Symantec Security Response.
Story image
Google Wave riders vulnerable, Imperva says
Tue, 13th Oct 2009
#
malware
#
breach prevention
#
cybersecurity
Data security specialist company Imperva said that cybercriminals will be looking to exploit users of Google’s Wave technology, specifically Wave web searches.
Story image
Cybercrims ready to ride Google's Wave
Mon, 12th Oct 2009
#
malware
#
breach prevention
#
cybersecurity
As Google’s Wave technology garners attention, cybercriminals are poised to exploit user interest, warns data security firm Imperva.
Story image
Phishers smarter, more devious
Thu, 1st Oct 2009
#
phishing
#
email security
#
ibm
As the Web continues to offer new features and services, and users get more sophisticated, so cybercriminals&nbsp; devise more innovative ways to trick them.
Story image
a HacK tHat was more tHan a HiccUP
Mon, 1st Jun 2009
#
risk & compliance
#
cloud services
#
melbourne it
The recent hacking of the Domainz registry may have looked like a storm in a teacup, but the  implications for the security of Web sites are much larger.