Hotmail flaw allows attackers to exfiltrate emails

Hotmail flaw allows attackers to exfiltrate emails


Hotmail flaw allows attackers to exfiltrate emails

Posted: 24 May 2011 09:11 AM PDT

The analysis of a recent targeted attack against webmail users has led Trend Micro researchers to discover a vulnerability in Microsoft's Hotmail webmail service that allowed attackers to siphon conta...

Fake VirusTotal site serves malware

Posted: 24 May 2011 08:36 AM PDT

VirusTotal - the popular free file checking website - has been spoofed by malware peddlers, warns Kaspersky Lab. A simple visit to the site triggers the download of a worm via a java applet embedde...

IBM WebSphere Portal XSS vulnerability

Posted: 24 May 2011 07:24 AM PDT

A vulnerability has been reported in IBM WebSphere Portal, which can be exploited by malicious people to conduct cross-site scripting attacks, according to Secunia. Certain input passed to the sear...

Spammers establish their own fake URL-shortening services

Posted: 24 May 2011 07:08 AM PDT

For the first time ever, spammers are establishing their own their own fake URL-shortening services to perform URL redirection, according to Symantec. This new spamming activity has contributed to ...

LinkedIn security flaws allow account hijacking

Posted: 24 May 2011 06:58 AM PDT

LinkedIn users are in danger of having their their account hijacked when accessing it over insecure Wi-Fi networks or public computers, says independent security researcher Rishi Narang, and it's all ...

US communications privacy law in for a change?

Posted: 24 May 2011 05:38 AM PDT

As technology speeds progressively forward, privacy laws need to get updated. As the amount of information we share and keep online - on social networks, stored in cloud services or on mail servers...

Cybercrime statistics show widespread phishing problem

Posted: 24 May 2011 02:51 AM PDT

The top five industries vulnerable to cybercrime include travel, education, financial services, government services and IT services, according to KnowBe4. Using the Inc.com website to obtain domain...

The rise of layered fraud prevention

Posted: 24 May 2011 01:28 AM PDT

By 2014, 15 percent of enterprises will adopt layered fraud prevention techniques for their internal systems to compensate for weaknesses inherent in using only authentication methods, according to Ga...

Mobile users: Risky behavior and weak security

Posted: 24 May 2011 12:58 AM PDT

Researchers found that while an increasing number of consumers use mobile devices for both business and personal activities, large numbers are not familiar with their employer's corporate policy on th...

iPhone hardware encryption investigated

Posted: 24 May 2011 12:50 AM PDT

Users of Apple iPhone devices accumulate huge amounts of highly sensitive information stored in their smartphones. Historical geolocation data, viewed Google maps and routes, Web browsing history a...

0 comments:

Post a Comment