Blackhole exploit kit got upgraded

Blackhole exploit kit got upgraded


Blackhole exploit kit got upgraded

Posted: 02 Jul 2012 07:34 AM PDT

Phoenix and Blackhole are the most popular and widely used exploit kits because their creators are always tinkering with them and pushing out update and improved attack capabilities. Blackhole's au...

Fake "Tax Refund" emails targeting UK citizens

Posted: 02 Jul 2012 06:50 AM PDT

The UK tax season came to an end in April, and notifications about tax returns have begun slowly trickling down to the country's citizens. But unfortunately among those legitimate messages there are a...

Firewall management, IPv6 and you

Posted: 02 Jul 2012 06:47 AM PDT

Created 30 years ago, IPv4 has a 32-bit addressing scheme and can support approximately 4.3 billion devices connected directly to the Internet. Well aware that IPv4 addresses would eventually run out,...

Fake Red Cross emails link to private PayPal account

Posted: 02 Jul 2012 06:18 AM PDT

A rather generic but well-crafted fake American Red Cross email has recently been hitting inboxes around the world and asking recipients for donations: As the offered link can be seen leading to ...

Malicious emails target Uyghur activists, deliver backdoors

Posted: 02 Jul 2012 04:40 AM PDT

Highly targeted emails carrying a backdoor Trojan are currently directed at Uyghur activists, warn Kaspersky Lab and Alien Vault researchers. The former spotted emails obviously targeting Mac users...

ISACA issues COBIT 5 for Information Security

Posted: 02 Jul 2012 01:03 AM PDT

ISACA released COBIT 5 for Information Security, which builds on the COBIT 5 framework to provide practical guidance for those interested in security at all levels of an enterprise. ISACA's COBIT 5 fr...

Microsoft SQL Server 2012 T-SQL Fundamentals

Posted: 01 Jul 2012 09:30 PM PDT

Get started with the fundamentals of Transact-SQL and learn how to write efficient and powerful database queries. With this hands-on guide, you'll gain a solid understanding of T-SQL and good programm...

Week in review: Investigating Android permissions, a new malware detection method, and a drastic decline in online vulnerabilities

Posted: 01 Jul 2012 09:00 PM PDT

Here's an overview of some of last week's most interesting news, interviews, videos and articles: App retrieving contactless credit card details pulled from Google Play The Near Field Communicat...

0 comments:

Post a Comment