Government-owned credit cards compromised in contractor breach

Government-owned credit cards compromised in contractor breach


Government-owned credit cards compromised in contractor breach

Posted: 11 Apr 2011 08:40 AM PDT

Numbers and expiry dates of over 600 credit cards belonging to government and law enforcement employees have been stolen and exposed after an attack aimed at an Australian telecommunications company. ...

Maturity model for information security management

Posted: 11 Apr 2011 08:29 AM PDT

The Open Group announced a new information security management standard, The Open Group Information Security Management Maturity Model (O-ISM3), which enables the creation of Information Security Mana...

Koobface says goodbye to Facebook

Posted: 11 Apr 2011 06:43 AM PDT

Koobface - the computer worm that targets users of the social networking websites such as Facebook, MySpace, Twitter and others - has stopped using Facebook to spread. It's somewhat ironic that th...

"Official Profile Viewer Application" Facebook scam

Posted: 11 Apr 2011 05:37 AM PDT

After many, many offers of applications that supposedly show Facebook users who views their profile the most, has the time finally come when these lures don't work as they used to? Or have the scammer...

Network security blunders: Tales from the field

Posted: 11 Apr 2011 05:00 AM PDT

We've all made one in our career, I'm talking about that blunder you thought you would be fired for. My first blunder was rebooting all the campus router pairs at one time, not one by one, all at once...

Spam about the Jasmine Revolution leads to malware

Posted: 11 Apr 2011 04:50 AM PDT

By the end of 2010, the total number of Chinese Internet users reached 457 million. That means that even if scammers and hackers concentrate exclusively on that particular segment of the Internet-usin...

Week in review: Epsilon breach, MITM attacks and the execution of the RSA hack

Posted: 11 Apr 2011 01:19 AM PDT

Here's an overview of some of last week's most interesting news, reviews, videos and articles: The execution of the RSA hack More than two weeks have passed since the high profile RSA hack, and ...

0 comments:

Post a Comment