Fake account verification email phishes for Google credentials

Fake account verification email phishes for Google credentials


Fake account verification email phishes for Google credentials

Posted: 10 Apr 2012 11:09 AM PDT

Once again, Google users are being targeted with emails purportedly coming from the Google Team, confirming a bogus recovery e-mail update: Seeing the threat of a permanent account suspension is ...

Microsoft released six comprehensive security updates

Posted: 10 Apr 2012 10:30 AM PDT

This month Microsoft issued six bulletins, four critical, two important, addressing 11 distinct vulnerabilities. Organizations should focus most of their attention on MS12-027. What makes this bulleti...

Email campaigns still targeting pro-Tibetan orgs

Posted: 10 Apr 2012 09:37 AM PDT

Malicious Tibetan-themed email campaigns are still going strong, targeting pro-Tibetan organizations and making them inadvertently install malware on their machines. The following apparently innocu...

Utah data breach numbers 750K+ victims

Posted: 10 Apr 2012 08:32 AM PDT

Social Security numbers of some 280,000 Medicaid and Children's Health Insurance Plans users and "less sensitive" information on 500,000 more of them has been exfiltrated from a Utah Department of Tec...

600K strong Flashback botnet comprises mostly Macs

Posted: 10 Apr 2012 07:55 AM PDT

There has been a lot of talk and speculation about the size of the botnet formed by computers targeted with the Flashback malware and whether all these machines were, in fact, all Macs. The botne...

An unsecured computer is worse than an unlocked home

Posted: 10 Apr 2012 04:56 AM PDT

Using a computer without security is riskier than leaving your home or car unlocked. In a survey of 1,637 Internet users aged 18 and older, Webroot asked respondents to gauge the perceived threat l...

Poor internal security processes spell disaster

Posted: 10 Apr 2012 03:59 AM PDT

Poor internal security management processes present more risk than malicious threats. More than 50 percent of an AlgoSec survey respondents incurred a system outage due to an out-of-process change. ...

Mobile devices expose company data to vulnerabilities

Posted: 10 Apr 2012 02:00 AM PDT

Mobilisafe announced results of its SMB focused study. As part of a private beta program, participants evaluated a product that assesses the security risk of mobile devices accessing their company's n...

Linksys Wi-Fi routers with app enabled capabilities released

Posted: 10 Apr 2012 12:06 AM PDT

Cisco unveiled a new line of Linksys Smart Wi-Fi Routers with app enabled capabilities. The three new routers offer support for Cisco Connect Cloud, which provides anytime, anywhere management of mult...

Smart meters vulnerable to false data injection

Posted: 09 Apr 2012 11:30 PM PDT

Power grids connect electricity producers to consumers through interconnected transmission and distribution networks. In these networks, system monitoring is necessary to ensure reliable power grid op...

Establishing a GRC program with Keylight Platform

Posted: 09 Apr 2012 11:00 PM PDT

LockPath released Keylight Platform 2.3 which gives users the ability to upload data files (.xls and .csv) and import them directly into DCF tables. In addition, Threat Manager now displays vulne...

SecureZIP Reader for iOS released

Posted: 09 Apr 2012 10:01 PM PDT

PKWARE announced SecureZIP Reader for iOS, an application that secures enterprise and government data on phones and tablets. The SecureZIP solution secures corporate information that end-users se...

Using Mac OS X Lion Server

Posted: 09 Apr 2012 09:01 PM PDT

If you're considering a Mac OS X server for your small business, school, nonprofit, or home network, Using Mac OS X Lion Server will help you get up and running in no time. You'll learn how to sh...

0 comments:

Post a Comment