Splunk 4.0.10 released |
- Splunk 4.0.10 released
- Vast online data leak in South Korea
- European banks lack document security
- Brandjacking: Online brand abuse soars
- The rise of amateur-run botnets
- News of Corey Haim's funeral lead to fake AV
- Rogue software details: Smart Security
- Does Web 2.0 need Web security 2.0?
- Collection of security checks for Linux
- Introducing the Cyber Defence conference
- Week in review: Compromised hardware, AV failures and published IE 0-day exploit
Posted: 15 Mar 2010 12:00 PM PDT Splunk released version 4.0.10 of the Splunk IT search and analysis engine. The following issues have been resolved in this release:As of Splunk version 4.0.10, summary index searches do not coun... |
Vast online data leak in South Korea Posted: 15 Mar 2010 11:25 AM PDT South Korean retailer Shinsegae and 24 other companies have been breached and private data on 20 million customers has been stolen, forcing the Ministry of Public Administration and Security to announ... |
European banks lack document security Posted: 15 Mar 2010 11:00 AM PDT Financial services companies across Europe are unintentionally putting their confidential information at risk, according to research from Ricoh. At the heart of the issue is the lack of a centralized ... |
Brandjacking: Online brand abuse soars Posted: 15 Mar 2010 09:20 AM PDT Online brand abuse rose across major industries in 2009 according to the MarkMonitor Brandjacking Index. The report reveals the total number of phishing attacks was at an all-time high, with attacks t... |
The rise of amateur-run botnets Posted: 15 Mar 2010 08:56 AM PDT It used to be that cyber criminals were people with a highly technical skill set, but this is not the norm anymore. This fact became obvious some two weeks ago when news of the takedown of the Maripos... |
News of Corey Haim's funeral lead to fake AV Posted: 15 Mar 2010 06:20 AM PDT Corey Haim's death is old news by now, but fans of the prematurely deceased teen idol are still on the lookout for information concerning his death. Those interested in the details regarding his f... |
Rogue software details: Smart Security Posted: 15 Mar 2010 12:04 AM PDT Smart Security is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\ProgramFiles\SmartSecurity.ex... |
Does Web 2.0 need Web security 2.0? Posted: 14 Mar 2010 10:06 PM PDT Web 2.0 is thriving, and so too are applications that take advantage of this technology. Interactive sites like LinkedIn, Twitter and even company websites are becoming ever more popular, and yet, man... |
Collection of security checks for Linux Posted: 14 Mar 2010 09:27 PM PDT Buck Security is a collection of security checks for Linux. It was designed for Debian and Ubuntu servers, but can be useful for any Linux system. The aim of Buck Security is, to allow you to get a... |
Introducing the Cyber Defence conference Posted: 14 Mar 2010 09:03 PM PDT Cyber warfare has become a major concern for international governments, military and civil agencies over the past few years. A recent wave of cyber attacks against NATO member Estonia in 2007, and the... |
Week in review: Compromised hardware, AV failures and published IE 0-day exploit Posted: 14 Mar 2010 09:01 PM PDT Here's an overview of some of last week's most interesting news, articles and interviews: Zuckerberg hacked into journalists' email? The Facebook co-founder has been accused three years ago of s... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment