A keylogging virus has infected the computers that control U.S. Predator and Reaper drones."The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not preve...
When people hear the words "cyber war," they've been conditioned to think of national secrets being stolen and catastrophic damage to vital public infrastructure. Over recent months many technical d...
As applications increasingly move to virtualized environments, the need for security solutions that examine virtual applications continues to grow.
Security ...
Trend Micro is one of the "big four" business endpoint security vendors, along with Symantec, McAfee and Kaspersky. Its offering comes in two versions: a standard one, calle...
In many-layered defense approaches, you will find a hardened desktop somewhere in the architecture. Many security experts consider the hardened desktop a necessity but it c...