Counterclank: Info-stealing Trojan or advertising tool?

Counterclank: Info-stealing Trojan or advertising tool?


Counterclank: Info-stealing Trojan or advertising tool?

Posted: 31 Jan 2012 11:20 AM PST

A couple of days ago, Symantec has warned about Counterclank, an Android Trojan that has been unknowingly installed by users on over five million devices. This huge number was possible because the ...

Law firms get hacked for deal data

Posted: 31 Jan 2012 07:10 AM PST

A successful cooperation between a law firm and its clients depends on the firm's ability of keeping the details of these relationships confidential - something that becomes harder and harder as cyber...

Compromised WordPress sites lead to Phoenix exploit kit

Posted: 31 Jan 2012 04:08 AM PST

Several hundred compromised websites that at first glance don't appear to be malicious have been discovered by M86 researchers. The websites - mostly blogs and small, private pages - use Wordpress ...

Greatest risks to database security

Posted: 31 Jan 2012 03:27 AM PST

The greatest challenge to database security may actually come from organizational issues, rather than nefarious or accidental acts, according to a survey presented by Application Security. In most ...

The state of global cyber-readiness

Posted: 31 Jan 2012 02:36 AM PST

McAfee and the Security and Defence Agenda (SDA) revealed the findings from a report that paints a global snapshot of current thinking about the cyber-threat and the measures that should be taken to d...

Identity and access management trends

Posted: 31 Jan 2012 01:51 AM PST

Six major trends will drive the evolution of corporate management of identity and access management (IAM) and privacy management in 2012, according to Gartner. "In 2012, businesses need to increa...

Apache Shiro: Java security framework

Posted: 31 Jan 2012 01:09 AM PST

Apache Shiro is a Java security framework that performs authentication, authorization, cryptography, and session management. With Shiro's API, you can secure any application – from the smallest mobile...

The ABCs of security and compliance

Posted: 31 Jan 2012 12:15 AM PST

Understanding Security and Compliance is as easy as ABC: Access, Breaches and Changes. At a distance security and compliance share many similarities. As you get into the details, what you'll find is t...

High-performance wireless APs from Aruba Networks

Posted: 30 Jan 2012 11:09 PM PST

Aruba Networks announced two additions to its portfolio of wireless access points. The Aruba Instant IAP-134 and IAP-135, both 900Mbps 802.11n access points, are designed for smaller offices and SMEs.

The Web Application Hacker's Handbook, 2nd Edition

Posted: 30 Jan 2012 10:06 PM PST

Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This pra...

0 comments:

Post a Comment