Hacked Yahoo email accounts in China and Taiwan

Hacked Yahoo email accounts in China and Taiwan


Hacked Yahoo email accounts in China and Taiwan

Posted: 31 Mar 2010 11:57 AM PDT

Yahoo email accounts of several journalists and human activists have been hacked and their contents likely downloaded in what seems like an organized attack concentrated on gaining as much intelligenc...

QuickTime 7.6.6 fixes security issues

Posted: 31 Mar 2010 11:19 AM PDT

Here is the security content related to QuickTime 7.6.6, available for download here. Playing maliciously crafted audio content may lead to an unexpected application termination or arbitrary code e...

Breached companies are not entitled to anonymity

Posted: 31 Mar 2010 10:43 AM PDT

Does the recent decision by District Judge Douglas Woodlock - to unseal the identities of two companies (J.C. Penney and Wet Seal) whose customer data has been stolen by TJX hacker Albert Gonzales - ...

Cloud computing security: An insider's view

Posted: 31 Mar 2010 10:30 AM PDT

As CSO of Qualys, Randy Barr is responsible for security, risk management and business continuity planning of the QualysGuard platform. In this video Randy talks about cloud computing security from an...

Unlike popular belief, short links on Twitter aren't malicious

Posted: 31 Mar 2010 10:11 AM PDT

Twitter recently announced that it has implemented a new security system to scan all URLs posted in tweets to protect users from malicious sites. This follows a similar announcement from bit.ly in Nov...

New Linksys wireless routers

Posted: 31 Mar 2010 10:02 AM PDT

Cisco unveiled a new line of Linksys wireless routers, designed to let its core audience of tech experts and enthusiasts take their home networking experience to the next level. With the addition...

Blackhat SEO techniques

Posted: 31 Mar 2010 09:47 AM PDT

The business of using blackhat Search Engine Optimization (SEO) techniques to impregnate legitimate sites has become a huge money-spinner for cybercriminals. Every day scores of new malicious campaign...

Researcher exploits PDF file without using a vulnerability

Posted: 31 Mar 2010 08:26 AM PDT

Didier Stevens, security researcher and expert on malicious PDF files, has succeeded in creating a proof-of-concept PDF file that uses the launch action triggered by the opening of the file to execute...

Social networking risks under little control

Posted: 31 Mar 2010 08:05 AM PDT

While social media is pervasive in organizations worldwide, usage has far outpaced controls, according to the latest study conducted by Palo Alto Networks. The degree of associated risk varies dramati...

Beware targeted attacks around tax season

Posted: 31 Mar 2010 07:50 AM PDT

With the tax filing deadline less than three weeks away, we're entering the busiest time of the tax season according to the IRS. Last year, almost 95 million people e-filed their tax returns. That was...

Root issues causing software vulnerabilities

Posted: 31 Mar 2010 07:45 AM PDT

A survey on software security assurance conducted during the Security B-Sides conference shows 50% of software companies say security is "always a concern." More than half of the participants of the E...

Korea becomes world's biggest malware producer

Posted: 31 Mar 2010 07:25 AM PDT

Korea has taken over from the US as the world's largest producer of Internet viruses, according to analysis of internet threats in March by Network Box. Korea now accounts for a massive 31.1 per ce...

0 comments:

Post a Comment