Bogus Royal Mail emails deliver malware

Bogus Royal Mail emails deliver malware


Bogus Royal Mail emails deliver malware

Posted: 20 Aug 2012 10:17 AM PDT

UK-based Internet users should be on the lookout for spoofed Royal Mail emails, as cyber crooks have decided to impersonate the institution and try to deliver malware to unsuspecting victims, warns S...

92% of the top 100 mobile apps have been hacked

Posted: 20 Aug 2012 10:15 AM PDT

Ninety-two percent of the Top 100 paid Apple iOS apps and 100 percent of Top 100 paid Android apps have been hacked, according to a new report by Arxan Technologies. They revealed the widespread ...

Event: ZeroNights

Posted: 20 Aug 2012 09:13 AM PDT

ZeroNights is an international conference dedicated to the technical side of information security. The mission of the conference is to disseminate information about new attack methods, threats and def...

SailPoint updates identity management solution IdentityIQ

Posted: 20 Aug 2012 09:11 AM PDT

SailPoint announced the release of IdentityIQ 6.0, an enterprise-grade identity management solution that scales to support thousands of business users at a single time. New features include: G...

Rogue WhatsApp Facebook apps harvest info, lead to malware

Posted: 20 Aug 2012 09:04 AM PDT

Rogue Facebook apps still occasionally pop up, even though they are not nearly as ubiquitous as they used to be. More often than not they supposedly show users who has been viewing their profile, ...

SMSZombie Android Trojan infects 500,000 users

Posted: 20 Aug 2012 07:12 AM PDT

With its vast number of Android users and their preference for third-party online app markets, China is the perfect breeding ground for new Android malware. Chinese mobile security company TrustGo ...

Secure hardware storage encryption from SafeNet

Posted: 20 Aug 2012 06:49 AM PDT

SafeNet extends its comprehensive portfolio of data security solutions into the storage security market with StorageSecure, a NAS security solution developed in partnership with NetApp that encrypts d...

From identity and access solutions to access governance

Posted: 20 Aug 2012 06:30 AM PDT

The need to identify users, control what they can access and audit their activities is fundamental to information security. Over the past decade, there has been a tsunami of identity and access manage...

AMD's blog hacked, user data leaked

Posted: 20 Aug 2012 05:59 AM PDT

The official blog of microprocessor manufacturer AMD has been hacked by a group of relative newcomers to the hacking scene that go by the name of r00tBeer. The main page of the blog - located at bl...

Military-grade encryption for Android devices

Posted: 20 Aug 2012 05:55 AM PDT

AuthenTec introduced a new security offering that provides military-grade encryption to data stored on Android smartphones and tablets. MatrixDAR helps bring Android devices into compliance with ...

Copyright infringement blackmail scam targets mobile phone users

Posted: 20 Aug 2012 04:00 AM PDT

Swedish mobile users are being targeted with SMS messages accusing them for copyright infringement and urging them to pay a fine between 90 and 195 euros. "You have downloaded copyrighted porn. Soo...

OkayFreedom: VPN solution for private surfing

Posted: 19 Aug 2012 11:00 PM PDT

Steganos Software announced OkayFreedom, a VPN service enabling Internet users to privately and securely surf all Web content, regardless of their location. Designed for individuals who want to pro...

Developing and Hosting Applications on the Cloud

Posted: 19 Aug 2012 10:00 PM PDT

In this book, key developers of the IBM SmartCloud Enterprise share indispensable insights for developing and operating cloud-based solutions on any cloud platform. Drawing on their in-the-trench...

Week in review: Shamoon attacks, automated hacking, Assange granted asylum in Ecuador

Posted: 19 Aug 2012 09:00 PM PDT

Here's an overview of some of last week's most interesting news, podcasts, reviews, videos and articles: Scientists create algorithm for tracking down sources of online attacks Swiss researcher ...

0 comments:

Post a Comment