Next-generation Trojan plunders East European bank accounts

Next-generation Trojan plunders East European bank accounts


Next-generation Trojan plunders East European bank accounts

Posted: 17 Jun 2010 10:08 AM PDT

Russian and Ukrainian banks have been lately trying to stop the onslaught of BlackEnergy 2, a Trojan that manages to bypass the Java application that the customers use to authenticate themselves when ...

WordPress 3.0 released

Posted: 17 Jun 2010 10:04 AM PDT

WordPress 3.0, the thirteenth major release of WordPress and the culmination of half a year of work by 218 contributors, is now available for download and comes with 1,217 bug fixes and feature enhanc...

Text message phishing attacks drop significantly

Posted: 17 Jun 2010 09:05 AM PDT

Text-to-phone phishing attacks (often called "smishing") dropped dramatically in the first quarter of 2010, according to a report by Internet Identity (IID). Smishing attacks were down 62 percent f...

Free Internet security book for kids

Posted: 17 Jun 2010 09:01 AM PDT

As unstructured summertime looms, kids and teens are likely to be spending more time on the Internet. Now, a free download is available to help them keep themselves safer both online and while using a...

Anti-virus Immunet Protect 2.0 released

Posted: 17 Jun 2010 08:45 AM PDT

Immunet released Protect Free 2.0, the latest version of the real-time anti-virus software for Windows. Immunet Protect is designed specifically to protect consumers and their social network agai...

Months-old Skype vulnerability exploited in the wild

Posted: 17 Jun 2010 08:12 AM PDT

A Skype flaw patched some 9 months ago with the new version (4.1.0.179) of the VoIP client has been spotted being exploited in the wild. According to M86 Security Labs, the vulnerability has been d...

Financial services firms hesitant to adopt cloud computing

Posted: 17 Jun 2010 06:10 AM PDT

Today's financial services firms are avoiding popular IT infrastructure investments such as cloud computing, in large part due to data security and transparency concerns, according to a survey of 82 o...

Winning the browser security battle

Posted: 17 Jun 2010 06:00 AM PDT

Operation "Aurora", the sophisticated Chinese cyber attack that hit several dozen companies in December 2009, not only compromised the intellectual property of the companies, but also raised the criti...

New book: "Microsoft SQL Server 2008 Administrator's Pocket Consultant"

Posted: 17 Jun 2010 05:49 AM PDT

Microsoft SQL Server 2008 Administrator's Pocket Consultant, 2nd Edition is a concise, immediate reference you'll want with you at all times as you deal with SQL Server 2008 and SQL Server 2008 R2 adm...

iTunes 9.2 fixes security vulnerabilities

Posted: 17 Jun 2010 05:42 AM PDT

iTunes 9.2 comes with several new features, improvements and security fixes. ColorSync A heap buffer overflow exists in the handling of images with an embedded ColorSync profile. Opening a malic...

0 comments:

Post a Comment