Microsoft patches 20 vulnerabilities

Microsoft patches 20 vulnerabilities


Microsoft patches 20 vulnerabilities

Posted: 13 Dec 2011 12:22 PM PST

For the December Patch Tuesday, Microsoft released thirteen security bulletins that fix vulnerabilities targeting Windows, Internet Explorer, and Office. Three are marked as critical and ten as import...

12 hacking groups are behind most Chinese cyber attacks

Posted: 13 Dec 2011 11:40 AM PST

Eastern European and Russian hackers mostly steal financial information, while Chinese ones are mainly after intellectual propriety or other sensitive data, say security analysts and US officials, and...

Nitro attackers still at it, mock Symantec

Posted: 13 Dec 2011 10:26 AM PST

Back at the beginning of November, Symantec researchers made public a report they compiled on a spear phishing campaign carrying a backdoor Trojan that was systematically targeting companies in the ch...

The multiple dimensions of corporate espionage

Posted: 13 Dec 2011 08:41 AM PST

You've spent months fixing the red items on an internal audit report and just passed a regulatory exam. You've performed a network vulnerability assessment and network pen test within the last year an...

Sykipot Trojan takes advantage of Adobe Reader zero-day flaw

Posted: 13 Dec 2011 07:12 AM PST

AlienVault Labs researchers have unearthed a piece of malware that takes advantage of the recently discovered zero-day Adobe Reader flaw used for attacking defense contractors. The malware in quest...

Confidential data exposure in public spaces

Posted: 13 Dec 2011 07:05 AM PST

While protecting data on computers is top of mind for everyone, most organizations are focused on conventional security technologies such as anti-virus software, personal firewalls and spam filters, a...

Top software failures of 2011

Posted: 13 Dec 2011 07:00 AM PST

SQS Software Quality Systems compiled a list of the worst software failures of 2011 that have damaged reputations, impacted negatively on financials and caused stress to users. Phil Codd, Managing ...

Holiday travel is risky business for mobile devices

Posted: 13 Dec 2011 05:46 AM PST

The holidays are a time for tropical getaways, traveling to Grandma's house to see family and friends and one of the likeliest times a person will lose their mobile device, according to AVG. Their ...

iPad 2 and $1,000 gift cards offered by scammers

Posted: 13 Dec 2011 05:38 AM PST

Typosquatting is often-used tool by online scammers who try to take advantage of users looking for legitimate pages, and a recently spotted spam campaign is employing that technique to redirect users ...

Card info of 1m Restaurant Depot customers stolen in breach

Posted: 13 Dec 2011 05:11 AM PST

Customers of US foodservice wholesaler Restaurant Depot and "cash and carry" chain Jetro have begun receiving letters warning them about the possibility of their credit card details having been stolen...

NETGEAR router with Mac features

Posted: 13 Dec 2011 05:09 AM PST

NETGEAR announced Wireless Extreme for Mac and PC (WNDRMAC), the company's first home router to offer Mac-specific capabilities – including native support for Apple's Time Machine back-up software and...

Managing firewalls in virtual environments

Posted: 13 Dec 2011 04:02 AM PST

AlgoSec announced the ia solution for managing firewalls in virtual environments. AlgoSec Security Management Suite simplifies hypervisor-level firewall management by automating the analysis and ch...

The risks of unauthorized access

Posted: 13 Dec 2011 03:48 AM PST

HP unveiled new global research that reports increased threats to sensitive and confidential workplace data are created by a lack of control and oversight of privileged users, including database admin...

0 comments:

Post a Comment