Skype users targeted with calls spreading fake AV

Skype users targeted with calls spreading fake AV


Skype users targeted with calls spreading fake AV

Posted: 19 Sep 2011 10:25 AM PDT

Showing considerable resourcefulness in their attempt to trick Internet users, fake AV peddlers have begun targeting Skype users with an unexpected call. "Attention: this is an automated computer s...

Bots troll hacker forums to discover data breaches

Posted: 19 Sep 2011 09:24 AM PDT

When talking about bots, the first thing that comes to mind is often a bad one - i.e. how cyber crooks misuse the technology to bilk Internet users out of information or money. But, there is a firm ou...

iManager multiple vulnerabilities

Posted: 19 Sep 2011 08:16 AM PDT

Gjoko Krstic has discovered multiple vulnerabilities in iManager, which can be exploited by malicious people to conduct cross-site scripting attacks, manipulate certain data, and disclose sensitive in...

Cybercriminals find new ways to disguise spam

Posted: 19 Sep 2011 07:59 AM PDT

It used to be that malicious attachments came in emails with erotic photos of girls who "want to meet you", or "scandalous photos" of celebrities. Now, cybercriminals are disguising their messages to ...

Securing virtual environments and reducing malware risk

Posted: 19 Sep 2011 07:54 AM PDT

Rapid7 announced that the new version of its vulnerability management solution, Nexpose 5.0, will address the complex security challenges presented by the wide scale adoption of virtualization technol...

Pay-per-install services attempt discreet comeback

Posted: 19 Sep 2011 07:20 AM PDT

"Pay-per-install businesses can be temporarily compromised by welcome law enforcement action, but the crooks will always find a way to return," says McAfee's Francois Paget, who shared his recent disc...

Con artists love social networks

Posted: 19 Sep 2011 06:18 AM PDT

Most social networks' users are hit by online scams almost daily - whether its the ubiquitous survey scam or the "share your cell phone number, get subscribed for a premium number service". These s...

New versions of Trend Micro enterprise data protection software

Posted: 19 Sep 2011 06:14 AM PDT

Trend Micro now offers completely integrated data protection for messaging and collaboration systems providing many feature advantages for security professionals. ScanMail for Microsoft Exchange ...

Smartphone and tablet security tips

Posted: 19 Sep 2011 06:01 AM PDT

ICSA Labs is offering a series of tips that businesses and consumers can use to protect themselves from security risks aimed at smartphones, tablets and apps. 1. Only buy apps from recognized app s...

Data seepage from the corporate boundary

Posted: 19 Sep 2011 05:00 AM PDT

In a growing number of cases, Internet-facing business systems do not always reflect a well maintained, up-to-date security profile, and, as one would expect they are, by inference, vulnerable to expl...

Japanese defense contractor breached

Posted: 19 Sep 2011 04:48 AM PDT

Mitsubishi Heavy Industries has revealed that its networks have been breached in what is considered the first cyber attack to hit Japan's defense industry. According to Reuters and Japanese newspap...

Event: Black Hat Abu Dhabi 2011

Posted: 19 Sep 2011 03:54 AM PDT

This year's Black Hat Abu Dhabi will bring the best in cyber security research and technical training to the middle East region; offering a deeper view into the increasingly complex threats presented ...

Week in review: Windows 8 security features, the end of DigiNotar and BIOS rootkit in the wild

Posted: 18 Sep 2011 09:01 PM PDT

Here's an overview of some of last week's most interesting news: Linux Foundation suffers security breach A few weeks after the discovery of the compromise of the kernel.org website and several ...

0 comments:

Post a Comment