Increased illicit behavior on Internet pharmacies

Increased illicit behavior on Internet pharmacies


Increased illicit behavior on Internet pharmacies

Posted: 09 Dec 2010 07:54 AM PST

Of the nearly 7,000 sites reviewed by the National Association of Boards of Pharmacy, only 4% of those online sites appear to be in compliance with pharmacy laws and practice standards. OpSec perfo...

L0phtCrack 7: The next level of password auditing and recovery

Posted: 09 Dec 2010 07:30 AM PST

L0phtCrack is one of the most used tools by security professionals worldwide. After years of inactivity, version 6 was released in 2009 and development hasn't halted since. In the video below, L0ph...

Polyglot worm spreads via IM

Posted: 09 Dec 2010 07:11 AM PST

A curious little worm has been spotted spreading via various IM applications - Skype, ICQ, MSN Messenger, Google Talk, and others. What is curious about it is that it has the ability to detect the...

Anonymous continues with DDoS attacks, possibly using a non-volunteer botnet

Posted: 09 Dec 2010 06:05 AM PST

Anonymous - the hacktivist group that has become notorious for its DDoS attacks on websites of the RIAA, MPAA, and other anti-piracy organizations and companies - has taken it upon themselves to "defe...

Facebook Mobile Privacy Dashboard gets an upgrade

Posted: 09 Dec 2010 04:11 AM PST

Mobile Facebook users will soon have much more control over they privacy settings - they will be able to see what information they are sharing with which applications and websites and edit those setti...

Fake Facebook toolbar leads to malware

Posted: 09 Dec 2010 03:16 AM PST

It has become a predictable pattern - every time Facebook introduces some changes, malicious spammers start e-mail campaigns that try to take advantage of the news and lure users into downloading malw...

Trojans dominate the threat landscape

Posted: 09 Dec 2010 12:50 AM PST

As in recent months, Trojans dominated the threat landscape in November, according to GFI Software. Their data revealed that seven of the top 10 malware threats were classified as Trojans. The number-...

Deploy and remotely execute programs on Windows networks

Posted: 09 Dec 2010 12:00 AM PST

RemoteExec for Windows is an agentless, encrypted software solution that allows IT pros to:Quickly and easily deploy MSI packages, Service Packs, patches, hotfixes, etc.Remotely execute programs (.exe...

Run Nmap on Android

Posted: 08 Dec 2010 11:21 PM PST

Droidmap is an Android application for root users that implements some functions of Nmap in a GUI. This program comes with installer scripts for the installation of the required Nmap application th...

Scammers preying on those wanting to adopt

Posted: 08 Dec 2010 10:27 PM PST

The IC3 received information from law enforcement and complaints filed with the IC3 concerning an adoption scam. The scam is an attempt to collect personal information and funds from individuals se...

Learn Cisco networking while playing a game

Posted: 08 Dec 2010 09:45 PM PST

The Cisco CCENT Mind Share Game is a multimedia PC game that helps users acquire knowledge necessary for success on CCENT and CCNA exams. Featuring more than 75 stages, the world-class learning gam...

Nessus in the cloud

Posted: 08 Dec 2010 09:03 PM PST

The Nessus vulnerability scanner features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of an organization's security posture. Tena...

0 comments:

Post a Comment