Relentlessly annoying banking Trojan

Relentlessly annoying banking Trojan


Relentlessly annoying banking Trojan

Posted: 26 Feb 2010 09:19 AM PST

The majority of banking trojans prefers to hide in the deepest recesses of your computer and silently steal your login credentials. But CA's researchers recently came face to face with one that pr...

SQL injection attack show-and-tell

Posted: 26 Feb 2010 08:43 AM PST

SQL injection has, for a long time now, found its way to the top places of the list of favorite attack vectors of cyber criminals. Its popularity is, without a doubt, due to the relative ease of use a...

Microsoft cripples the Waledac botnet

Posted: 26 Feb 2010 07:44 AM PST

A few days ago, Microsoft has requested and was granted a temporary restraining order that resulted in the takedown of 273 Internet domains that are believed to belong to criminals that operate the ma...

Mobile workforce shift will cause security headache

Posted: 26 Feb 2010 07:43 AM PST

A recent iPass report highlights the rising numbers of workers are moving to a truly mobile working environment confirms what many in the IT security industry have suspected for some time, says Claire...

Security monitoring: Having vision for the future

Posted: 25 Feb 2010 10:00 PM PST

Security attacks such as website hacking, security breaches and malware threats are all becoming increasingly common and sophisticated in design. The latest high-profile security breach against Google...

Cloud based Web application security assessment

Posted: 25 Feb 2010 09:30 PM PST

Cenzic released ClickToSecure Cloud, a self-service, completely cloud based Web application security assessment solution. With this new cloud platform, Cenzic has created open APIs to allow deeper int...

Pros and cons of biometric authentication

Posted: 25 Feb 2010 09:21 PM PST

In theory, biometrics are a great way to authenticate a user: it's impossible to lose your fingerprint (barring the most gruesome of developments), you can't forget it like you could a password, and i...

International Secure Systems Development Conference

Posted: 25 Feb 2010 09:03 PM PST

The International Secure Systems Development Conference, taking place in London during May 2010, addresses the key issues around designing-in security for standard and web-based software and systems, ...

Q&A: InfoSec World Conference

Posted: 25 Feb 2010 09:03 PM PST

Dina Dvinov is the Conference Marketing Manager at the MIS Training Institute and in this interview discusses the InfoSec World Conference. Introduce InfoSec World Conference to our readers. InfoS...

0 comments:

Post a Comment