FacebookDigits phishing scam

FacebookDigits phishing scam


FacebookDigits phishing scam

Posted: 12 May 2010 11:34 AM PDT

Facebook users have lately been targeted lately by a clever phishing scam. The phishing website, whose looks evoke those of the social network, is trying to convince potential victims that they can no...

WordPress users under attack

Posted: 12 May 2010 10:55 AM PDT

WordPress-based websites have once again become the target of attacks. This time around, the hacked websites are hosted by various ISPs: DreamHost, GoDaddy, Media Temple and Bluehost, and there are al...

One crime syndicate responsible for most phishing attacks

Posted: 12 May 2010 08:37 AM PDT

A single electronic crime syndicate employing advanced malware was responsible for two-thirds of all the phishing attacks detected in the second half of 2009 -- and was responsible for the overall inc...

Less than half of cloud services are vetted for security

Posted: 12 May 2010 06:26 AM PDT

More than half of U.S. organizations are adopting cloud services, but only 47 percent of respondents believe that cloud services are evaluated for security prior to deployment, according to a survey b...

Stealth HD Series: USB portable security devices

Posted: 12 May 2010 06:06 AM PDT

MXI Security introduced the new Stealth HD Series of encrypted USB hard drives. Replacing the well-known Outbacker MXP Series, the Stealth HD Series is powered by MXI Security's Bluefly Portable Secur...

Filename-changing worm wiggling on P2P networks

Posted: 12 May 2010 05:26 AM PDT

Worms using P2P networks to propagate have one big problem: they are usually masquerading as software, key generators, or cracks, but have hard-coded file names, which means that once the software's n...

Network admins worry about employee use of social media

Posted: 12 May 2010 04:21 AM PDT

According to findings a survey of 353 network administrators by Amplitude Research, four-in-ten (40%) were either "extremely concerned" (18%) or "moderately concerned" (22%) with employee use of socia...

ENISA maps key online security actors and strategies across Europe

Posted: 12 May 2010 12:36 AM PDT

A study by the European Network and Information Security Agency (ENISA) provides a 750 pages-plus overview of the status of network and information security (NIS) in 30 European countries, including i...

Rogue software details: Data Protection

Posted: 11 May 2010 11:40 PM PDT

Data Protection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Data Protection.lnk ...

0 comments:

Post a Comment