Author of cloud-based phishing kit harvests collected credentials from phishers using it

Author of cloud-based phishing kit harvests collected credentials from phishers using it


Author of cloud-based phishing kit harvests collected credentials from phishers using it

Posted: 27 Jul 2010 11:00 AM PDT

People who embark on a life of crime are usually attracted by the promise of little effort and big money, and the hacker whose phishing kit was discovered to be collecting credentials from the phisher...

Exploitability data from real-time feeds

Posted: 27 Jul 2010 10:42 AM PDT

Qualys announced that QualysGuard Vulnerability Management now includes correlated exploitability information from real-time feeds to provide customers with up-to-date references to exploits and relat...

A closer look at Panda Cloud Antivirus Free Edition

Posted: 27 Jul 2010 08:00 AM PDT

Panda Cloud Antivirus (v.1.1.2) consists of a lightweight antivirus agent that is connected in real-time to PandaLabs' online Collective Intelligence servers for a faster protection against the newest...

ZeuS, Sality, Chymine and Vobfus jump on the LNK vulnerability bandwagon

Posted: 27 Jul 2010 06:55 AM PDT

Stuxnet was only the beginning. The successful exploitation of the (still unpatched) Windows LNK flaw has prompted other malware attackers to try to achieve the same results. Luckily for us, a gen...

Facebook launches Safety page

Posted: 27 Jul 2010 05:59 AM PDT

Facebook recently passed the 500,000 user milestone, and the time has come to introduce a new addition to the already existing Facebook initiatives designed to keep users abreast of the various safety...

P2P increasingly favored by malware attackers

Posted: 27 Jul 2010 04:41 AM PDT

Cisco released its 2Q10 Global Threat Report, which is an aggregation of data and insights on threats from Cisco Security Intelligence Operations. The report merges the most current threat analysis fr...

PC surveillance software for Terminal Servers

Posted: 27 Jul 2010 03:22 AM PDT

Refog announces the release of Refog Terminal Monitor, a centralized software-based employee tracking system for the Terminal Server allowing administrators to track employee activities from a single ...

The impact of structural vulnerabilities on enterprise websites

Posted: 27 Jul 2010 03:10 AM PDT

Dasient released a new research report, "Structural Vulnerabilities on Websites: Why Enterprise Websites Are Vulnerable to Malware Attacks," which found that, across all verticals, 75 percent of enter...

0 comments:

Post a Comment