Are computer "health certificates" the answer for the botnet problem? |
- Are computer "health certificates" the answer for the botnet problem?
- Infamous Canadian Pharmacy spam affiliate program shuts down
- Large scale study of SSL configurations
- A phishing e-mail to learn from
- A Guide to Kernel Exploitation
- The importance of e-mail security
- Facebook privacy changes - a missed opportunity?
- The threat behind fake LinkedIn messages
- Guide helps enterprises design and implement key controls
- High expectations for personal information protection
- Navigation and fingerprint authentication device
Are computer "health certificates" the answer for the botnet problem? Posted: 07 Oct 2010 08:31 AM PDT Back in March, at the RSA Conference in San Francisco, Corporate Vice President for Trustworthy Computing at Microsoft Scott Charney proposed to the audience and to the world the idea of confining inf... |
Infamous Canadian Pharmacy spam affiliate program shuts down Posted: 07 Oct 2010 08:09 AM PDT When it comes to spam, we're all used to rising numbers - and the rising annoyance. But it seems that there could finally a reason to rejoice: it looks like Spamit, the infamous pharmacy affiliate pro... |
Large scale study of SSL configurations Posted: 07 Oct 2010 07:00 AM PDT Ivan Ristic is the director of engineering at Qualys and principal author of ModSecurity, the open source web application firewall. In this podcast, Ivan talks about the Qualys SSL Labs Internet-wi... |
A phishing e-mail to learn from Posted: 07 Oct 2010 06:00 AM PDT A phishing attempt that makes even people who are very good at spotting them pause for a moment and take a good look is a perfect example on which to learn. Ravi Dehar of OpenDNS shares such an e-m... |
A Guide to Kernel Exploitation Posted: 07 Oct 2010 04:45 AM PDT The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playi... |
The importance of e-mail security Posted: 07 Oct 2010 04:38 AM PDT E-mail is exposed at various points along its transmission, via backups, by IT staff members, or during firewall inspection. And not just the text: attachments account for around 96 percent of the tot... |
Facebook privacy changes - a missed opportunity? Posted: 07 Oct 2010 04:28 AM PDT Facebook announced yesterday that changes are coming soon to the Facebook interface, in particular to the 'Groups' system. According to CEO Mark Zuckerberg, Facebook will, for the first time, make it ... |
The threat behind fake LinkedIn messages Posted: 07 Oct 2010 01:17 AM PDT Retarus sent out a warning in response to a current wave of fake contact requests via the social media platform LinkedIn. These well-simulated e-mail messages present a considerable risk to PC-owners. |
Guide helps enterprises design and implement key controls Posted: 06 Oct 2010 11:52 PM PDT Recent international regulations have placed the need for monitoring internal controls at the top of the boardroom agenda. Having controls in place is a basic business requirement, but it is no longer... |
High expectations for personal information protection Posted: 06 Oct 2010 09:18 PM PDT According to a recent survey by ING, nine in 10 adults agree that financial services companies should be doing more to protect their customers' personal and financial information. Survey findings... |
Navigation and fingerprint authentication device Posted: 06 Oct 2010 09:03 PM PDT AuthenTec unveiled today the world's smallest fingerprint sensor for combining authentication and navigation functions in one device, the AES850. This low profile sensor is designed and packaged fo... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment