IT firm falls victim to online bank fraud, loses $100,000 |
- IT firm falls victim to online bank fraud, loses $100,000
- Windows Live ID phishing spam
- The need for global cooperation on cyber security
- First certified cloud-based solution for FDCC compliance
- Rapid7 NeXpose now includes Exploit Exposure
- Whats a rogue and why do you need to know?
- Phishers target Blogger users
- Widespread data breaches uncovered by FTC probe
- Undetected data breaches are the ones that hurt the most
- Excalibur Conference 2010 call for papers
IT firm falls victim to online bank fraud, loses $100,000 Posted: 23 Feb 2010 12:29 PM PST The latest company to fall victim to a plundering of their account by the hands of cyber criminals is Cynxsure, an IT consultancy firm based in New Hampshire. The criminals broke into their accoun... |
Posted: 23 Feb 2010 10:32 AM PST Joe Wilcox warns of what seems to be an attempt to phish his Windows Live ID and password. Here is the contents of the email purporting to come from the "Windows Live Team": Are you protected? ... |
The need for global cooperation on cyber security Posted: 23 Feb 2010 09:37 AM PST When the Internet was in its teens, it was hard to imagine it evolving as far as it has. Yesterday I was chuckling over an article from 1995 in which the author adamantly claims that the Internet is a... |
First certified cloud-based solution for FDCC compliance Posted: 23 Feb 2010 09:27 AM PST Qualys announced its new QualysGuard FDCC module the first certified cloud-based computing solution for FDCC compliance. The module, validated by the National Institute of Standards and Technology (... |
Rapid7 NeXpose now includes Exploit Exposure Posted: 23 Feb 2010 09:21 AM PST Rapid7 announced Exploit Exposure, a new technology in its vulnerability management product, Rapid7 NeXpose. Exploit Exposure provides users with deeper insight into the breach paths for vulnerabiliti... |
Whats a rogue and why do you need to know? Posted: 23 Feb 2010 07:08 AM PST You may not be familiar with the term rogue software but there's a very good chance that you or someone you know either has experienced it, or will in the near future. As malware writers inundate the ... |
Posted: 23 Feb 2010 05:47 AM PST Users of Google's Blogger, a free blog publishing tool, are the targets of the latest phishing email campaign: The text of the message couldn't be simpler, and the embedded link that brings the u... |
Widespread data breaches uncovered by FTC probe Posted: 23 Feb 2010 05:14 AM PST The Federal Trade Commission has notified almost 100 organizations that personal information, including sensitive data about customers and/or employees, has been shared from the organizations' compute... |
Undetected data breaches are the ones that hurt the most Posted: 23 Feb 2010 04:59 AM PST File transfer technologies have been around for over 30 years, but recent evolutionary changes in business needs have resulted in significant improvements to file transfer solutions from a security, m... |
Excalibur Conference 2010 call for papers Posted: 23 Feb 2010 04:47 AM PST In autumn 2010, the Excalibur Conference in China, will feature talks but world-renowned security professionals that will address new areas of research. The event will cover topics related to Internet... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment