A peek in the world of vulnerability sellers

A peek in the world of vulnerability sellers


A peek in the world of vulnerability sellers

Posted: 21 Mar 2012 10:10 AM PDT

As you probably already know, this year's edition of Pwn2Own wasn't the only hacking contest at the CanSecWest conference held earlier this month. Pwn2Own rules have been changed and, not satisfied...

Georbot information stealing Trojan uncovered

Posted: 21 Mar 2012 09:03 AM PDT

ESET revealed its analysis of Georbot, an information stealing Trojan and botnet spreading in the country of Georgia. Earlier this year ESET's global research team uncovered Win32/Georbot, a botnet...

Google educates Gmail users on spam

Posted: 21 Mar 2012 08:33 AM PDT

Educating computer users about security is something that every online service should consider doing, and I'm glad to see that Google has started explaining why its Gmail spam filter blocks specific e...

Mousetrap Trojan steals money by chain reaction

Posted: 21 Mar 2012 08:03 AM PDT

Catalin Cosoi, Chief Security Researcher at Bitdefender warns of a new Trojan that robs your bank account. The new Mousetrap campaign starts with a Java applet that has been injected into a popular...

Mobile forensics and cloud security at SANS Secure Europe 2012

Posted: 21 Mar 2012 07:14 AM PDT

SANS Secure Europe 2012, one of the region's largest infosec training events will be returning to Amsterdam from 5th to 19th of May with its largest roster of courses including new sessions on mobile ...

Duqu developers still active, researchers say

Posted: 21 Mar 2012 05:43 AM PDT

Duqu, the infamous remote access Trojan first discovered in November 2011 and thought to have been created by the same authors as Stuxnet, is still getting modified by its developers and, obviously, u...

Event: Infosecurity Europe 2012

Posted: 21 Mar 2012 02:36 AM PDT

Visit Infosecurity Europe 2012, to get a better insight into how you can secure your IT Infrastructure, insure you are fully compliant and learn from best practice end user examples. With over 300 ...

Risk across the phases of application security

Posted: 21 Mar 2012 02:26 AM PDT

A new Ponemon Institute study surveyed more than 800 IT Security and Development professionals from enterprise organizations to understand the perceptions both groups have about application security m...

Tips for backups in virtual environments

Posted: 21 Mar 2012 12:47 AM PDT

With the rate of virtualized servers being added to IT environments, organizations are facing new challenges in how to adequately protect data and ensure its recoverability without backup operations l...

GSM cracking revelations are profound

Posted: 21 Mar 2012 12:17 AM PDT

Commenting on news reports that an Indian company has revealed it can tumble and clone the credentials of mobile phone SIM cards over the airwaves - apparently because certain Indian GSM carriers are ...

Network intrusion detection for Amazon Web Services

Posted: 21 Mar 2012 12:16 AM PDT

Alert Logic announced the availability of Alert Logic Threat Manager and ActiveWatch for Amazon Web Services (AWS). AWS customers using Amazon EC2 interested in an added layer of network protection ca...

0 comments:

Post a Comment