New Mac Trojan copies successful Windows Trojan technique

New Mac Trojan copies successful Windows Trojan technique


New Mac Trojan copies successful Windows Trojan technique

Posted: 23 Sep 2011 09:25 AM PDT

Windows users have been warned time and time again of malware hiding behind icons and extensions belonging to files associated with legitimate software - most notably PDF, DOC and XLS files. In spi...

Over 300 cyberspy attacks against Russian targets discovered

Posted: 23 Sep 2011 06:44 AM PDT

Trend Micro researchers have discovered that 1465 computers belonging to 47 distinct political and economical entities in 61 different (mostly former Soviet Union) countries have been compromised thro...

Strong security is just common sense

Posted: 23 Sep 2011 05:27 AM PDT

For many years those who concerned themselves with an organization's cyber security warned of threats, both internal and external, urging organizations to adequately protect themselves. Unfortunately ...

Suspected LulzSec and Anonymous arrested and charged

Posted: 23 Sep 2011 04:00 AM PDT

Three more alleged LulzSec and Anonymous members have been arrested by the FBI and/or indicted for their misdeed, reports CNet. 23-year-old Cody Andrew Kretsinger (aka "recursion"), of Phoenix, A...

How to build a trusted virtualized platform

Posted: 23 Sep 2011 03:30 AM PDT

Trusted Computing Group (TCG) released the first Virtualized Platform Architecture, which describes how to build a trusted virtualized platform. With this specification, robust Trusted Computing te...

ICSA Labs launches network IPS testing program

Posted: 23 Sep 2011 01:49 AM PDT

ICSA Labs is launching a quarterly testing program for network intrusion prevention systems. The quarterly testing, which is available to all IPS manufacturers, is also an enhancement to ICSA Labs' ce...

Veracode enhances its application risk management platform

Posted: 23 Sep 2011 01:39 AM PDT

Veracode, announced enhancements to its cloud-based application risk management platform that make it even easier to embed security verification processes into the software product development lifecyc...

OpenStack Diablo to power global clouds

Posted: 23 Sep 2011 01:39 AM PDT

OpenStack, the open source cloud operating system, released Diablo, the fourth version of its community-driven software. OpenStack Diablo allows users to automate and control pools of compute, stor...

Tips for safe online shopping

Posted: 22 Sep 2011 09:45 PM PDT

Avira recommends that consumers watch for a few things in order to not become a victim of the online fraudsters: 1. Always check that the connection to the online store where the payment is done is...

FortiNet FortiAnalyzer XSS and script insertion vulnerabilities

Posted: 22 Sep 2011 09:03 PM PDT

Two vulnerabilities have been reported in FortiNet FortiAnalyzer, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting ...

0 comments:

Post a Comment