President's death used for fake AV peddling

President's death used for fake AV peddling


President's death used for fake AV peddling

Posted: 12 Apr 2010 12:07 PM PDT

Scammers are taking advantage of the people's interest in the news of the tragic death of Poland's President Lech Kaczynski to peddle their fake AV software. By poisoning search results, they are ...

Farm Town players targeted by malvertisements?

Posted: 12 Apr 2010 07:53 AM PDT

Players of the popular Facebook game application Farm Town are warned not to fall for the fake security warnings claiming that the user is infected by a virus that pop up while they are playing. Sl...

Endpoint data leak prevention still a major headache

Posted: 12 Apr 2010 06:42 AM PDT

More than one in three (38%) of respondents are still failing to deploy any form of data leak prevention, whether that be device control, endpoint DLP or DLP appliances. Amongst small to medium sized ...

Cash extortion scheme targets BitTorrent users

Posted: 12 Apr 2010 05:38 AM PDT

BitTorrent users are targeted by an unprecedented extortion campaign that threatens them with legal action for copyright infringement, unless the pay a $400 "fine". According to TorrentFreak, the m...

WordPress hacked, affected blogs point to malware site

Posted: 12 Apr 2010 03:44 AM PDT

A throng of blogs have been compromised and are pointing readers to a malicious website containing scripts that lead to a Trojan that drops and executes other malicious files. The origin of the att...

Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 available

Posted: 12 Apr 2010 02:41 AM PDT

Visual Studio 2010 and .NET Framework 4 have something for every developer. The new editor, now using Windows Presentation Foundation, supports concepts such as the use of multiple monitors. This enab...

Identity Management for the cloud: Taking the next step

Posted: 12 Apr 2010 02:30 AM PDT

Identity and Access Management (IAM) in its present do a pretty good job dealing with internal users and systems. Unfortunately, that isn't what most companies really need the age of cloud computing. ...

Rogue software details: Antivirus Suite

Posted: 12 Apr 2010 02:17 AM PDT

Antivirus Suite is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\ApplicationData\lvwkbwfbr\tn...

New books: Windows Server 2008, Microsoft Forefront Threat Management Gateway

Posted: 12 Apr 2010 02:12 AM PDT

Windows Server 2008 Administrator's Pocket Consultant, Second Edition includes coverage of Windows Server 2008 R2 enhancements, including Hyper-V with Live Migration, Direct Access Infrastructure, Bra...

Event: QuahogCon 2010

Posted: 12 Apr 2010 02:11 AM PDT

QuahogCon is a regional conference for the hacker culture in all forms. Hardware, Software, Security, Social, Eco Hacking, Zero Impact Living. Like most hacker cons, it will run Friday to Sunday. We'l...

Week in review: Phone phishing, botnet monetization, and the new issue of (IN)SECURE Magazine

Posted: 11 Apr 2010 09:00 PM PDT

Here's an overview of some of last week's most interesting news, articles, interviews and videos: Insufficient employee security training for the cloud Despite security concerns and the expecte...

0 comments:

Post a Comment