President's death used for fake AV peddling |
- President's death used for fake AV peddling
- Farm Town players targeted by malvertisements?
- Endpoint data leak prevention still a major headache
- Cash extortion scheme targets BitTorrent users
- WordPress hacked, affected blogs point to malware site
- Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 available
- Identity Management for the cloud: Taking the next step
- Rogue software details: Antivirus Suite
- New books: Windows Server 2008, Microsoft Forefront Threat Management Gateway
- Event: QuahogCon 2010
- Week in review: Phone phishing, botnet monetization, and the new issue of (IN)SECURE Magazine
President's death used for fake AV peddling Posted: 12 Apr 2010 12:07 PM PDT Scammers are taking advantage of the people's interest in the news of the tragic death of Poland's President Lech Kaczynski to peddle their fake AV software. By poisoning search results, they are ... |
Farm Town players targeted by malvertisements? Posted: 12 Apr 2010 07:53 AM PDT Players of the popular Facebook game application Farm Town are warned not to fall for the fake security warnings claiming that the user is infected by a virus that pop up while they are playing. Sl... |
Endpoint data leak prevention still a major headache Posted: 12 Apr 2010 06:42 AM PDT More than one in three (38%) of respondents are still failing to deploy any form of data leak prevention, whether that be device control, endpoint DLP or DLP appliances. Amongst small to medium sized ... |
Cash extortion scheme targets BitTorrent users Posted: 12 Apr 2010 05:38 AM PDT BitTorrent users are targeted by an unprecedented extortion campaign that threatens them with legal action for copyright infringement, unless the pay a $400 "fine". According to TorrentFreak, the m... |
WordPress hacked, affected blogs point to malware site Posted: 12 Apr 2010 03:44 AM PDT A throng of blogs have been compromised and are pointing readers to a malicious website containing scripts that lead to a Trojan that drops and executes other malicious files. The origin of the att... |
Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 available Posted: 12 Apr 2010 02:41 AM PDT Visual Studio 2010 and .NET Framework 4 have something for every developer. The new editor, now using Windows Presentation Foundation, supports concepts such as the use of multiple monitors. This enab... |
Identity Management for the cloud: Taking the next step Posted: 12 Apr 2010 02:30 AM PDT Identity and Access Management (IAM) in its present do a pretty good job dealing with internal users and systems. Unfortunately, that isn't what most companies really need the age of cloud computing. ... |
Rogue software details: Antivirus Suite Posted: 12 Apr 2010 02:17 AM PDT Antivirus Suite is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\ApplicationData\lvwkbwfbr\tn... |
New books: Windows Server 2008, Microsoft Forefront Threat Management Gateway Posted: 12 Apr 2010 02:12 AM PDT Windows Server 2008 Administrator's Pocket Consultant, Second Edition includes coverage of Windows Server 2008 R2 enhancements, including Hyper-V with Live Migration, Direct Access Infrastructure, Bra... |
Posted: 12 Apr 2010 02:11 AM PDT QuahogCon is a regional conference for the hacker culture in all forms. Hardware, Software, Security, Social, Eco Hacking, Zero Impact Living. Like most hacker cons, it will run Friday to Sunday. We'l... |
Week in review: Phone phishing, botnet monetization, and the new issue of (IN)SECURE Magazine Posted: 11 Apr 2010 09:00 PM PDT Here's an overview of some of last week's most interesting news, articles, interviews and videos: Insufficient employee security training for the cloud Despite security concerns and the expecte... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment