Malicious Kodak Galleries used for serving Trojan

Malicious Kodak Galleries used for serving Trojan


Malicious Kodak Galleries used for serving Trojan

Posted: 30 Nov 2010 09:18 AM PST

A variant of a highly specialized Trojan has appeared on fake sites mimicking Kodak Gallery pages, where potential victims are urged to download software that would supposedly allow them to watch the ...

Top 10 privacy issues for 2011

Posted: 30 Nov 2010 08:49 AM PST

The prevalence of mobile devices with personally identifiable location-based information and the increasing use of social media are top concerns for 2011. With more personal information available o...

Real-time forensic search engine

Posted: 30 Nov 2010 08:23 AM PST

eIQnetworks launched ForensicVue, the first real-time forensic search engine to provide security analysts with the ability to search every piece of security data on their network. ForensicVue exten...

Government seizes 82 website domains

Posted: 30 Nov 2010 08:02 AM PST

Seizure orders have been executed against 82 domain names of commercial websites engaged in the illegal sale and distribution of counterfeit goods and copyrighted works as part of Operation In Our Sit...

Toshiba announces new self-encrypting drive

Posted: 30 Nov 2010 06:45 AM PST

Toshiba announced a 7,200 RPM 2.5-inch Self-Encrypting Drive (SED) that provides government-grade AES-256 hardware encryption incorporated in the disk drive's controller electronics. Based on the O...

Ransomware abounds

Posted: 30 Nov 2010 06:39 AM PST

Ransomware is any malware that manages to make a computer system or any of the files on it inaccessible to the user and asks him or her to pay up if they want to regain access. Unfortunately for us al...

Organizations still fail to control USB devices

Posted: 30 Nov 2010 04:55 AM PST

A survey has found that USB Flash drive ownership has exploded with 100% of the 229 respondents having at least one such device and more than 21% owning as many as 10 or more. While good news for v...

Behavior of Safari on the iPhone could benefit scammers

Posted: 30 Nov 2010 04:14 AM PST

A behavior of the Safari browser on the iPhone could be used by phishers and scammers to fool users into believing they have landed on a legitimate site, says Nitesh Dhanjani. In short, it allows s...

EU investigates Google antitrust violations

Posted: 30 Nov 2010 04:07 AM PST

The European Commission has decided to open an antitrust investigation into allegations that Google has abused a dominant position in online search, in violation of European Union rules. The openin...

Fake Trojan Removal Kit runs ThinkPoint rogue

Posted: 30 Nov 2010 03:08 AM PST

When looking for an anti-malware solution, it pays to be extra careful. Take the example of the "Trojan Removal Kit". It is offered on fake security scan pages that you might end up on quite accid...

Canon image originality verification proven useless

Posted: 30 Nov 2010 12:23 AM PST

ElcomSoft discovered vulnerability in Canon's Original Data Security System, a validation system to guarantee authenticity of digital images captured with supported Canon cameras. The vulnerability...

0 comments:

Post a Comment