Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.

Search

Search results

I need a solution Symantec's website used to have an option to type in a possible virus/trojan name and it would come up with info on,  if it is a threat and what to do about it. ...
Forum Discussion by Bub | 30 Aug 2014 | 2 comments
Online gaming - "En Taro Adun" to the Part 5 of the Security 1:1 Series Online gaming just like any other branch of internet community is being targeted for scam, fraud and hacks. Few years back the scope of the scams involving ...
Article by SebastianZ | 02 Jan 2014 | 1 comment
Welcome to the Security 1:1 - Part 3 In part 3 of the series we will discuss various types of network attacks. On this occassion I will introduce as well some types of attacks directed more at end-user than at network or host computers - we ...
Article by SebastianZ | 27 Dec 2013 | 1 comment
Welcome to the Security 1:1 - Part 2 In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack vectors. The introduced classification of ...
Article by SebastianZ | 26 Dec 2013 | 0 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 25 Dec 2013 | 1 comment
I need a solution We got an email about 2 weeks ago supposedly from the Better Business Bureau saying there was a case against us and to open the attached file for more information.  ...
Forum Discussion by M and M | 17 Sep 2013 | 1 comment
1 Introduction Smartphones have been widely adopted by organisations for day to day business and operational use, and employees can often access their work related data by connecting to corporate networks using their Smartphones. Many ...
Article by Vikas Rajole | 21 Mar 2013 | 12 comments
Prezados, bom dia. Muito estamos preocupados com grandes ataques a nossos computadores e redes, no qual o que menos queremos no momento, seria um roubo de informação ou algo do tipo. Porém vale lembrar a todos, que os ataques estão sendo modificados, ...
Idea by Fabiano.Pessoa | 01 Aug 2012 | 0 comments
Prezados, boa tarde.  Gostaria de salientar a necessidade de varredura em códigos de arquivo .bat  Todos nós sabemos que .bat não é vírus, é basicamente um arquivo de automação. Existem comandos reconhecidos pelo computador e que são executados ...
Idea by Fabiano.Pessoa | 30 Jul 2012 | 0 comments
St. John's, NF, Canada Thu, 13 September, 2012 - 8:30 - 10:45 NDT   Learn More about the ...
Event by stefanyd | 19 Jul 2012 | 0 comments