Articles about Secure Computing

The Register breaking news

McCain pulls ahead in pharmaceutical spam

USA '08 Barack Obama is ahead not only in the polls but where it counts the most - in spam messages. However, his presidential rival John McCain can claim his own guaranteed enlarged small victory. The Democrat candidate is the topic of 70 per cent more junk mail messages than his Republican counterpart overall. But McCain edges ahead …
John Leyden, 4 Nov 2008
The Register breaking news

Phishers adapt old scams to exploit bank turmoil

Scammers are exploiting meltdown in the banking sector in an attempt to trick users into handing over sensitive financial information. Phishing emails commonly pose as security checks from a prospective mark's bank. The latest generation of the scam imitates communiques about bank mergers. US consumer watchdog the Federal …
John Leyden, 12 Oct 2008
hands waving dollar bills in the air

McAfee snaps up Secure Computing

McAfee is buying smaller IT security rival Secure Computing for $465m in cash. Secure Computing is best known for its firewall and security appliances product lines but more recently it has been busy on the acquisition front, most recently with a deal to buy user control firm Securify for $20m earlier this month. Prior to …
John Leyden, 22 Sep 2008
The Register breaking news

Secure Computing snaps up user control firm Securify

Security appliance firm Secure Computing has bought user access monitoring and control firm Securify, in a deal valued at up to $20m ($15m guaranteed in cash and stock, plus an earn-out of up to $5m). Securify's appliance-based technology allows organisations to control and keep tabs on user access to applications. The …
John Leyden, 4 Sep 2008
The Register breaking news

The rise of the Malware Mafia

RSA Policy makers should reject pressure to draft new laws targeting phishing and other types of cyber crime because existing statutes already cover most of the illegal activity, a researcher who investigates online criminals said. Although phishing, malware attacks, and botnet propagation have all come about in the last decade or …
Dan Goodin, 11 Apr 2008

Create a news alert about Secure Computing, or find more stories about Secure Computing.

Biting the hand that feeds IT © 1998–2017