Tag: fsecure

Optus lowers entry barrier to Naked broadband 
 
Fear of China masks the work of other web spies 
By Ry Crozier | Nov 10, 2011 | Comment Now 
Mikko Hypponen urges IT managers to quit Adobe Reader.
 
Fear of China masks the work of other web spies 
By Ry Crozier | Nov 10, 2011 | Comment Now 
Mikko Hypponen urges IT managers to quit Adobe Reader.
 
F-Secure wipes Mac files 
By Nicole Kobie | Mar 17, 2011 | Comment Now 
Beta puts safe files in the trash.
 
Hypponen: Ban admin rights for all online users 
By Wendy Grossman | May 4, 2010 | Comment Now 
F-Secure's head of research talks Internet security
 
F-Secure updates security suite 
By Shaun Nichols | Sep 4, 2009 | Comment Now 
Unveils Internet Security 2010.
 
Only a "digital Pearl Harbour" can save us 
By Ry Crozier | Jul 8, 2009 | Comment Now 
A tidal shift is needed on co-operation.
 
Security experts uncover first ever SMS virus 
By Phil Muncaster | Apr 10, 2009 | Comment Now 
Finnish anti-malware firm F-Secure is predicting that SMS-generated mobile spam will be a major problem in the future.
 
Fortinet offers free recovery tool for SMS attack 
Jan 7, 2009 | Comment Now 
UTM vendor Fortinet has released a free software application to help users recover from the recently discovered ‘Curse of Silence’ or ‘CurseSMS’ mobile attack.
 
F-Secure Christmas warning: watch your phone 
Dec 12, 2008 | Comment Now 
Two thirds of people surveyed by F-Secure said they would not resist the temptation to leave a co-workers phone untouched if they found it unattended at the staff Christmas party.
 
F-Secure touts cloud-based security 
By Ian Williams | Nov 14, 2008 | Comment Now 
The amount of malware being punted around the internet is growing at an exponential rate, and traditional locally-based protection applications will soon buckle under the ...
1
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1054

Vote