Fake AV doorway pages in the spotlight |
- Fake AV doorway pages in the spotlight
- Google attack objective: Source code for the single sign-on system?
- Real-life consequences for choosing convenience over security
- Stop man-in-the-browser attacks with Entrust IdentityGuard Mobile
- 100 potential attacks per second blocked in 2009
- 20 critical controls interactive from SANS
- ESET Remote Administrator 4 released
- Phishing student loans' pages target students
- Gray Powell, the lost iPhone and malware
- Data integrity attacks a growing threat
- Event: Secure360 2010
Fake AV doorway pages in the spotlight Posted: 20 Apr 2010 10:30 AM PDT Fake AV has become a regular fixture of the threat landscape for quite some time now, and TrendLabs experts take a closer look at the different tactics employed on the so-called doorway pages to lead ... |
Google attack objective: Source code for the single sign-on system? Posted: 20 Apr 2010 09:29 AM PDT The January attacks on Google and other US companies may seem to us as if they have happened ages ago, but you can be sure that they are still actively involved in the internal and external investigat... |
Real-life consequences for choosing convenience over security Posted: 20 Apr 2010 09:11 AM PDT Despite being aware of security threats, the risky online behavior of young adults can negatively affect their future career prospects and financial standings, while leaving them vulnerable to identit... |
Stop man-in-the-browser attacks with Entrust IdentityGuard Mobile Posted: 20 Apr 2010 07:41 AM PDT As man-in-the-browser attacks continue to siphon funds from unsuspecting businesses and consumers, Entrust delivers a new authentication method for smartphones. Entrust IdentityGuard Mobile is a ... |
100 potential attacks per second blocked in 2009 Posted: 20 Apr 2010 06:11 AM PDT Symantec released its new security threat report which highlights key trends in cybercrime from Jan.1, 2009 to Dec. 31, 2009. In a year bookended by two very prominent cyber attacks Conficker in the... |
20 critical controls interactive from SANS Posted: 20 Apr 2010 06:01 AM PDT The SANS Institute released its 20 Critical Security Controls online interactive, a platform built to simplify the controls and let users choose how to consume them. The interactive offers abbrevia... |
ESET Remote Administrator 4 released Posted: 20 Apr 2010 06:00 AM PDT ESET announced availability of ESET Remote Administrator 4 which simplifies the deploymen and management of ESET business solutions. Key features and benefits include: Intelligent group manage... |
Phishing student loans' pages target students Posted: 20 Apr 2010 05:45 AM PDT University students in the UK that have taken out a loan with the Student Loans Company have lately been targeted by a phishing scam that presents to them a page that is supposedly a login page for "S... |
Gray Powell, the lost iPhone and malware Posted: 20 Apr 2010 03:42 AM PDT The story of the day is Gray Powell and the lost iPhone. I searched for him on Google and I was really surprised to see that 4 out of 10 results from Google's first page were links to malware. If... |
Data integrity attacks a growing threat Posted: 20 Apr 2010 03:10 AM PDT A survey by Infosecurity Europe of 420 organizations has found that a quarter (28%) have been subject to a data integrity attacks. Of those that think that data integrity attacks could be a problem 14... |
Posted: 20 Apr 2010 01:48 AM PDT Secure360 is planned by the Upper Midwest Security Alliance, a not-for-profit association of industry professionals dedicated to advancing the overall security of business, government and infrastructu... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment