FacebookDigits phishing scam |
- FacebookDigits phishing scam
- WordPress users under attack
- One crime syndicate responsible for most phishing attacks
- Less than half of cloud services are vetted for security
- Stealth HD Series: USB portable security devices
- Filename-changing worm wiggling on P2P networks
- Network admins worry about employee use of social media
- ENISA maps key online security actors and strategies across Europe
- Rogue software details: Data Protection
Posted: 12 May 2010 11:34 AM PDT Facebook users have lately been targeted lately by a clever phishing scam. The phishing website, whose looks evoke those of the social network, is trying to convince potential victims that they can no... |
Posted: 12 May 2010 10:55 AM PDT WordPress-based websites have once again become the target of attacks. This time around, the hacked websites are hosted by various ISPs: DreamHost, GoDaddy, Media Temple and Bluehost, and there are al... |
One crime syndicate responsible for most phishing attacks Posted: 12 May 2010 08:37 AM PDT A single electronic crime syndicate employing advanced malware was responsible for two-thirds of all the phishing attacks detected in the second half of 2009 -- and was responsible for the overall inc... |
Less than half of cloud services are vetted for security Posted: 12 May 2010 06:26 AM PDT More than half of U.S. organizations are adopting cloud services, but only 47 percent of respondents believe that cloud services are evaluated for security prior to deployment, according to a survey b... |
Stealth HD Series: USB portable security devices Posted: 12 May 2010 06:06 AM PDT MXI Security introduced the new Stealth HD Series of encrypted USB hard drives. Replacing the well-known Outbacker MXP Series, the Stealth HD Series is powered by MXI Security's Bluefly Portable Secur... |
Filename-changing worm wiggling on P2P networks Posted: 12 May 2010 05:26 AM PDT Worms using P2P networks to propagate have one big problem: they are usually masquerading as software, key generators, or cracks, but have hard-coded file names, which means that once the software's n... |
Network admins worry about employee use of social media Posted: 12 May 2010 04:21 AM PDT According to findings a survey of 353 network administrators by Amplitude Research, four-in-ten (40%) were either "extremely concerned" (18%) or "moderately concerned" (22%) with employee use of socia... |
ENISA maps key online security actors and strategies across Europe Posted: 12 May 2010 12:36 AM PDT A study by the European Network and Information Security Agency (ENISA) provides a 750 pages-plus overview of the status of network and information security (NIS) in 30 European countries, including i... |
Rogue software details: Data Protection Posted: 11 May 2010 11:40 PM PDT Data Protection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Data Protection.lnk ... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment