Experimental botnet reveals long sought answers

Experimental botnet reveals long sought answers


Experimental botnet reveals long sought answers

Posted: 20 Dec 2010 11:59 AM PST

Is there a better way of analyzing the ins and outs of a botnet than making one yourself? The answer to that question was negative for ESET's researcher Pierre-Marc Bureau and the rest of a team at Ec...

Upsurge of attacks aimed at Facebook, iPad and smartphones

Posted: 20 Dec 2010 08:46 AM PST

If you thought 2010 was challenging, just wait for 2011. Below are our top five 2011 security predictions for the coming year from Websense: The Stuxnet sequels are coming, stay tuned for "When Sta...

Free security tool detects vulnerable and outdated software

Posted: 20 Dec 2010 08:10 AM PST

Secunia released version 2.0 of their Personal Software Inspector (PSI), a popular free security tool for home users that protects their personal and financial information against cyber theft. With...

Google doesn't want to share its encryption keys

Posted: 20 Dec 2010 07:57 AM PST

Two years ago, the wish to have control over communication systems and the lack of technical resources of Indian intelligence agencies has led to a particular request targeted at Indian ISPs - to lowe...

Facebook scams soar

Posted: 20 Dec 2010 07:38 AM PST

Facebook users should be careful about survey scams that are quickly spreading across the social network. Many Facebook users are struggling to clean up their accounts once they've been tricked into a...

How to keep mobile devices secure while traveling

Posted: 20 Dec 2010 07:34 AM PST

'Tis the season to be jolly – and to leave sensitive corporate information behind at the airport! According to telephone interviews with the lost property offices of 15 UK airports, including Heathrow...

5 steps to detect and prevent fraud in the public sector

Posted: 20 Dec 2010 05:30 AM PST

Where there is money, there is the potential for misappropriation or misuse – intentional or otherwise. Nowhere is this more apparent than in governments where funds are held accountable to a cynical ...

The importance of identity in the digital age

Posted: 20 Dec 2010 05:00 AM PST

In the past decade our identity has undeniably evolved, we're preoccupied with identity theft and authentication issues, while governments work to adopt open identity technologies. David Mahdi, a Prod...

Vendor creates malware to sell its anti-malware product

Posted: 20 Dec 2010 03:27 AM PST

Chinese antivirus software companies seem to have a unusual strategy for keeping its services and products in demand - secretly developing threats themselves and unleashing them online, then turning a...

Week in review: Gawker breach, social engineering and security predictions for 2011

Posted: 20 Dec 2010 12:26 AM PST

Here's an overview of some of last week's most interesting news, videos, reviews and articles: Gawker Media breach claimed by Gnosis The credit for the breach of Gawker Media has been claimed by...

0 comments:

Post a Comment