The use of exploit kits changed spam runs

The use of exploit kits changed spam runs


The use of exploit kits changed spam runs

Posted: 12 Jul 2012 10:01 AM PDT

Spammers used to depend on email recipients to tie the noose around their own necks by inputing their personal and financial information in credible spoofs of legitimate websites, but with the advent ...

DarkComet RAT used by wide array of attackers

Posted: 12 Jul 2012 07:55 AM PDT

Remote administration software such as the DarkComet RAT has many legal uses but it is unfortunately more known for being frequently misused by a wide array of cyber attackers. These illegal uses a...

Instagram "Friendship Vulnerability" patched

Posted: 12 Jul 2012 06:42 AM PDT

A flaw in the popular Instagram app that allows potential snoopers to add themselves as friends of any Instagram user and, consequently, to access his or hers private information and photos has been d...

Nearly half a million Yahoo passwords leaked following hack

Posted: 12 Jul 2012 05:39 AM PDT

Some 450,000 email addresses and associated unencrypted passwords have been dumped online by the hacking collective "D33Ds Company" following the compromise of a Yahoo subdomain. The attackers sa...

GFI Software launches cloud security and networking platform

Posted: 12 Jul 2012 04:22 AM PDT

GFI Software announced GFI Cloud, a platform for the delivery of cloud services via a Web-based user interface, accessible from anywhere with an Internet connection. Initially, GFI Cloud will inc...

Top skills for IT asset management leaders

Posted: 12 Jul 2012 03:56 AM PDT

The evolving and growing role of IT asset management (ITAM) is driving both increased demand for existing skills and a new requirement for augmented financial, commercial and legal skills, according t...

Major pitfalls involving vulnerability scanners

Posted: 12 Jul 2012 12:30 AM PDT

While 92 percent of companies have a vulnerability management program in place, nearly half consider their networks to range from "somewhat" to "extremely" vulnerable to security threats, according to...

Reverse Deception: Organized Cyber Threat Counter-Exploitation

Posted: 11 Jul 2012 11:00 PM PDT

Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify APTs, categorize them according to risk level, and prioritize your actions accordingly by applying expert, field...

0 comments:

Post a Comment