Light Patch Tuesday features four bulletins

Light Patch Tuesday features four bulletins


Light Patch Tuesday features four bulletins

Posted: 08 Nov 2011 10:20 AM PST

For the November Patch Tuesday, Microsoft released four bulletins that fix vulnerabilities targeting Windows. One is marked as critical, two are important, and the last one is moderate. Qualys CTO...

SCADA systems flaws exploited to open prison doors

Posted: 08 Nov 2011 09:34 AM PST

The discovery of the Stuxnet worm has alerted governments around the world about the possibility of industrial control systems being targeted by hackers and has made a lot of security researchers conc...

Fedora 16: Cloud and virtualization features

Posted: 08 Nov 2011 08:49 AM PST

The Fedora Project announced the availability of Fedora 16, the latest version of its free open source operating system distribution. Notable feature enhancements include: Cloud computingAeolu...

Unknown malware rampant in enterprise networks

Posted: 08 Nov 2011 08:38 AM PST

New research from Palo Alto Networks shows that targeted and unknown malware are a reality in enterprise networks today, finding hundreds of unique, previously-unknown malware samples on live networks...

Anonymous admits leaking personal info on 16,000 Finns

Posted: 08 Nov 2011 07:23 AM PST

Anonymous has taken responsibility for the personal information of some 16,000 Finns ending up on a file sharing site on Saturday, and has additionally made public the membership application database ...

iOS flaw allows App Store apps download malicious code

Posted: 08 Nov 2011 04:59 AM PST

Since the App Store's inception, Apple has been carefully examining applications submitted by third-party developers in order to assure its customers a malware-free experience. Approved apps get signe...

Spammers' URL shortening sites highlight weakness of old security

Posted: 08 Nov 2011 04:45 AM PST

A recent Web threat report warned that spammers are now using their own URL shortening servicesto lure spam recipients into clicking on malicious web links. These use the ".info" top level domain and ...

One in nine Internet users surfing without protection

Posted: 08 Nov 2011 02:17 AM PST

The number of new malware strains continues to rise. G Data Security Labs counted over 1.2 million new computer malware strains in the first half of the year alone. Despite this, one in nine Internet ...

Framework for analyzing web-based threats

Posted: 08 Nov 2011 01:52 AM PST

Wepawet is a framework for the analysis of web-based threats. It uses a composition of tools and techniques to execute, trace, analyze, and characterize the activity of code whose execution is trigger...

Hybrid social engineering attacks

Posted: 08 Nov 2011 01:38 AM PST

Fraudulent phone calls are increasing in popularity. One possible use for these bogus 'bank' calls is to utilize personal identification information stolen using malware to give fraudsters credibility...

Event: InfoSec World Conference & Expo 2012

Posted: 08 Nov 2011 01:14 AM PST

The event features over 70 sessions, dozens of case studies, 9 tracks (including a Hands-On Track), 12 in-depth workshops, 3 co-located summits and an exhibit hall showcasing the industry's leading v...

Secure access to Office 365 cloud-based web applications

Posted: 07 Nov 2011 10:00 PM PST

RSA SecurID can now be integrated with the Windows Active Directory Federation Services 2.0 (AD FS 2.0). This integration can enable organizations to provide secure user access to Office 365 cloud-ba...

Access Windows using your iPad and iPhone

Posted: 07 Nov 2011 09:15 PM PST

Leostream Connect enables users to access secure and reliable Windows desktops and applications directly from their iOS device. This application allows an increasingly mobile workforce to remain ...

0 comments:

Post a Comment