Keeping PCs Safe on the Internet

PC Security Journal

Subscribe to PC Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get PC Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Articles from PC Security Journal
Cybercrime saw significant growth in 2009. It increased in prevalence and geographic spread. The only thing that didn’t grow was the skill level required to participate. It was easier for non-skilled attackers to conduct sophisticated attacks because of the availability of toolkits. Th...
Symantec, best known as the purveyor of the Norton antivirus software, is buying VeriSign’s identity and authentication business for $1.28 billion cash. That’s the unit that sells the Secure Sockets Layer (SSL) certificates and Public Key Infrastructure (PKI) services that protect el...
It’s hard to know what’s really going on on the other side of the Bamboo Curtain but initial reports suggest that the Chinese government has gone through with its threat to demand the keys to any technology it buys from foreign suppliers after May 1. It started by demanding to know h...
Worldwide PC shipments were up 27.4% year-over-year in Q1 to 84.3 million units, Gartner says, exceeding its 22% forecast. IDC puts the surge at 24% based on 79.1 million units. Either way it explains Intel’s sterling financial results Tuesday. Gartner gives a lot of the credit to EM...
Panda Security, the Cloud Security Company, on Thursday announced the general availability of Panda Cloud Internet Protection (PCIP), a new cloud-based security service that protects small and medium sized businesses (SMBs) from Internet-borne threats, including Botnets, phishing, cros...
M86 Security, the global expert in real-time Web and email threat protection, today announced a new slate of opportunities and additions for their Partner Focus channel program. With enhanced product offerings, including a proven secure web gateway appliance, which offers real-time thr...
Intel's co-founder, Gordon Moore, famously predicted [PDF file link] way back in 1965 that transistors on a chip will double every 2 years. And so they have ever since (therefore, Moore's Law). With increased processing power, computers are increasingly able to process more data in les...
Michael Dell said in Beijing that Dell should see about $5 billion from its sales in China, according to Reuters. Dell is also expecting to spend $25 billion in deals with Chinese suppliers and partners. Well, that’s what he said there. Apparently he told India that Dell should may...
Virtual Bridges, makers of the VERDE suite for desktop management and provisioning, on Tuesday announced the immediate availability of VERDE Hosted Powered by Rackspace. This new offering provides comprehensive hosted desktop virtualization solution for VDI, disconnected, and branch-of...
Qualys, the 10-year-old SaaS security pioneer, has started offering to scan web sites for free looking for malware, a process that will let it build up its knowledge base on the scurvy code and kinda serve mankind at the same time. But lest we get too altruistic, it’s also got anothe...
eTIPS VM, a virtual appliance offering for the data center; and Edge, a remote access authentication gateway. Also, additional enhancements to the award-winning eTIPS multi-function platform include comprehensive health checks for Microsoft Windows 7, 802.1X deployment support for the ...
These correspond to an approach called "Defense in Depth" that aims to put successive rings of protection between the bad guys and the information to protect, making successful attacks harder and harder. There are other types of security solutions, such as proactive security (Vulner...
Thanks to tough economic times and a generous dollop of fear-mongering from the media and opportunistic profiteers, we've all become myopically obsessed with cyber-crime. This is not entirely a bad thing. Unless you've been living under a rock, everyone knows that technology has creat...
When New York jeweler Harry Winston donated the famous Hope Diamond to the Smithsonian Institution, he shipped the 45.52-carat gem via US mail. Email users need to be warier than Winston. Unlike rocks, email messages scatter into tiny digital signals bouncing from computer to computer,...
Comodo has announced its new Internet browser, Comodo Dragon. Like Google Chrome, Comodo Dragon is constructed on the open-source Chromium Project browser. Dragon's enhancements increase security and protect user privacy. Comodo Dragon offers a new feature for Internet users. Websites ...
Cloud Leverage has launched enterprise-grade cloud solutions at a cost previously only available through commodity cloud offerings. At $.05 a GB per datacenter with no transfer or bandwidth charges -- Cloud Leverage offers a complete storage solution at a previously unavailable price.
local backup/disaster recovery, online backup, and Internet security.
Window Azure platform AppFabric has now been deployed to more data centers around the world. Previously, when you provisioned a service namespace, you were asked to select a region from a list that contained only United States (South/Central). Now, when you provision a service namespac...
The business communications industry is moving rapidly toward a cloud-based global model where converged IP and IT solutions are securely delivered through managed and professional services. Verizon Business continued during the fourth quarter to assemble the key components to lead tha...
The Chinese government went from having no reaction to Google’s spying charges and threat to exit the Chinese market to having a squad of its apparatchiki blowing smoke in the Chinese press after Secretary of State Hillary Rodham Clinton said last Thursday that the U.S. would make free...
Novell on Tuesday announced the availability of a suite of new tools that reduces the time and cost for independent software vendors (ISVs) and enterprises to develop, deploy and manage software appliances. With the availability of the SUSE Appliance Toolkit, Novell now delivers the in...
Cloud’s biggest problem isn’t security; it’s the continuous noise around security that distracts us from the real issues and the possible solutions. It’s not hard to create a jumbled list of things to worry about in the cloud. It is considerably harder to come up with a cohesive model ...
iStore on Thursday launched Digital Oilfield Online, a cloud-based hosting service for its PetroTrek software suite. The company unveiled its online cloud computing capability at the Microsoft Global Energy Forum, where it announced the immediate availability of cloud-hosted PetroTrek ...
To help meet growing customer and market demand for a highly secure computing environment for mobile workers, IronKey, the leader in secure and managed portable computing, on Thursday launched its Trusted Virtual Computing initiative to enable organizations to realize the cost-effectiv...
Comodo announces that its Backup 2.2 freeware now saves commands to executable script files, allowing administrators to automate their scheduling, backing-up and restoring commands. Like all previous versions, there is no charge to use Comodo Backup 2.2
Atlanta-based SecureWorks malware expert Joe Stewart says the main program used to hack Google and 30 other major companies and open a back door in their systems traces back to an unusual algorithm for error-checking transmitted data that appeared in a Chinese-authored technical paper ...
A zero-day Acrobat security hole in the buggy Adobe Reader, software that’s on practically every PC in the world, may be how Chinese hackers pulled off the cyber-attack on Google that has Google threatening to pull out of China, the world’s largest Internet market, according to iDefens...
The LA law firm representing Cybersitter LLC, the little American ISV that named the Chinese government in the $2.2 billion piracy suit it filed last week in a federal court, says its systems were attacked by China on Monday. “Beginning Monday evening,” it said in a statement, “attorne...
i365 on Monday announced the launch of the EVault Cloud-Connected Services Platform, a SaaS-enablement platform that allows Independent Software Vendors (ISVs) to securely and efficiently send data to the Cloud and begin offering their Software as a Service (SaaS). By connecting their ...
Advancing acceptance and implementation of continuous PCI DSS compliance in the retail industry, Lightwave Security today introduced SecureAware, an automated IT GRC system that helps organizations manage business risks and comply with Payment Card Industry (PCI) security standards ...
Cybersitter LLC, a little family-owned California ISV also known as Solid Oak Software, filed a $2.2 billion piracy suit Tuesday against the People’s Republic of China, seven major computer makers and two Chinese software houses in federal court in Los Angeles. It’s charging them with ...
As 2009 draws to a close, Panda Security, the Cloud Security Company, can look back on a series of awards and recognition from government institutions, organizations and the specialist press. Much of this acclaim recognizes the corporate strategy adopted by the company since 2008, the ...
Koders.com issued a summary of the most popular computer language keywords, files and projects used by developers in December, 2009. Analyzing search engine trends in a number of different computer languages, the "12 Days of Code Search" is based on hundreds of thousands of searches an...
The message from the VC community is clear – "don't waste our seed money on network and server equipment." The message from the US Government CIO was clear – the US Government will consolidate data centers and start moving towards cloud computing. The message from the software and hard...
Windows 7 has been touted as the easy-to-use upgrade to Vista. But IT professionals say that user “hand-holding” may be the biggest challenge for small businesses making the transition, according a survey of 200 small business IT professionals conducted by Citrix Online, a division of ...
In X.509 encryption, discriminating buyers check to be sure that certificate roots are well-protected. Certificate owners also check the distribution of the roots: can they be found in as many of the major browsers as possible? Owners aim for widespread distribution across all browsers...
Breach Security has announced the release of the WebDefend Global Event Manager, a solution developed to work in conjunction with the new Web Application Firewall service offered by Akamai Technologies. When deployed with Akamai’s Web Application Firewall service, the WebDefend Global ...
Akamai Technologies today expanded its cloud-based suite of security capabilities with the introduction of its Web Application Firewall managed service. Implemented on Akamai’s EdgePlatform, the service provides a scalable edge defense system for blocking Web application attacks in the...
Lenovo announced the Lenovo ThinkVantage Toolbox on Monday, a new combination of system health, security, and support services to keep ThinkPad laptop and ThinkCentre desktop PCs running safely and efficiently. Built on the proven PC-Doctor diagnostic platform, Lenovo ThinkVantage Tool...
Comodo Secure DNS is a domain name resolution service that resolves DNS requests through a worldwide network of redundant DNS servers. This can provide a much faster and more reliable Internet browsing experience than using the DNS servers provided by commercial ISPs, and does not requ...