Holiday spam e-mail runs start off

Holiday spam e-mail runs start off


Holiday spam e-mail runs start off

Posted: 15 Nov 2010 11:27 AM PST

Spammers peddling fake pills, replica watches, jewelry and bags are gearing up for the approaching holidays. According to Trend Micro researchers, using the upcoming Black Friday and Christmas sal...

Proof-of-concept Android app reveals platform's security bug

Posted: 15 Nov 2010 10:11 AM PST

Angry Birds is an extremely popular mobile game that can be played on Apple, Android and Nokia mobile devices - indeed, it has been downloaded by millions of users. So, when an application by the name...

Half of SMBs block employee access to Facebook

Posted: 15 Nov 2010 09:53 AM PST

Companies are becoming more vigilant when it comes to their employees' use of social networking sites, according to Webroot. The survey of more than 1,000 businesses from the U.S. and U.K. with up ...

40% of all rogueware was created in 2010

Posted: 15 Nov 2010 09:46 AM PST

PandaLabs warned that 40% of all fake antiviruses ever have been created this year. That is, ever since this type of malicious code was first reported four years ago, 5,651,786 unique rogueware strain...

Vulnerability assessment for Microsoft SQL Azure

Posted: 15 Nov 2010 09:35 AM PST

Sentrigo announced Repscan 4.0 which offers expanded support for cloud-based and open source database platforms, productivity enhancements for database administrators (DBAs) and added management capab...

VLC 1.1.5 fixes Windows vulnerability

Posted: 15 Nov 2010 04:51 AM PST

The VLC development team introduced VLC 1.1.5, the sixth release of the 1.1.x branch of VLC. This release focuses on minor features, bugfixes and security issues:VideoLAN-SA-1006 security issue on ...

Will ears replace fingerprints as a form of ID?

Posted: 15 Nov 2010 04:39 AM PST

Fingerprint checks and iris scans may be the most popular ways of biometric identification for the time being, but it looks like they might soon be joined - if not surpassed - by outer ear scanning. ...

Security preparations for IPv6 migration must start now

Posted: 15 Nov 2010 03:24 AM PST

The arrival of a slew of new and upgraded operating systems, smartphones and tablets that are enabled for IPv6 has the potential to open new and unrecognized security weaknesses in otherwise secure en...

Top 10 security threats for 2011

Posted: 15 Nov 2010 02:51 AM PST

Imperva announced their predictions for the top ten security trends for 2011 which have been compiled to help IT security professionals defend their organization against the next onslaught of cyber se...

Lethic Trojan is back, uses same stolen digital certificate as Stuxnet

Posted: 15 Nov 2010 02:35 AM PST

Some two months ago, the world found out about the Stuxnet - the worm that used the Windows .lnk file vulnerability in order to spread through removable drives of systems running Siemens SCADA softwar...

Week in review: Firesheep countermeasure tool, Facebook bug and Barracuda bug bounty program

Posted: 14 Nov 2010 09:01 PM PST

Here's an overview of some of last week's most interesting news, articles and reviews: Firesheep countermeasure tool BlackSheep Zscaler researchers have created, and are now offering to every co...

0 comments:

Post a Comment