Arrests of money mules follow ZeuS gang takedowns

Arrests of money mules follow ZeuS gang takedowns


Arrests of money mules follow ZeuS gang takedowns

Posted: 04 Oct 2010 09:58 AM PDT

Last week's arrests and indictments of two gangs (one based in the U.K. and one in the U.S.) that used the ZeuS Trojan to syphon huge amounts of money from private and business banking accounts all ov...

The U.S. leads in malicious URLs

Posted: 04 Oct 2010 09:27 AM PDT

During the first half of 2010, Europe sped through the spam-generating fast-lane, bypassing North and South Americas, and Asia-Pacific to earn the "Top Producer of Spam" title. Based on a Trend Mic...

How to cut costs and still remain secure

Posted: 04 Oct 2010 08:00 AM PDT

You've just heard your budgets have been cut once again! This time it's across all IT and security has got to be slashed too. As a CISO or IT manager, or indeed a member of an organization that has se...

XSS flaws found on three security firms' websites

Posted: 04 Oct 2010 07:24 AM PDT

A group of white-hat hackers has discovered various XSS vulnerabilities on websites belonging to three well-known security companies, and have reported it to the firms themselves so that they can fix ...

Review: Seven Deadliest Wireless Technologies Attacks

Posted: 04 Oct 2010 06:45 AM PDT

Author: Brad Haines Pages: 160 Publisher: Syngress ISBN: 1597495417 Introduction Part of Syngress' "The Seven Deadliest Attack Series", this book introduces the reader to the anatomy of a...

Cyber security report reveals Feds' take on FISMA 2.0

Posted: 04 Oct 2010 05:54 AM PDT

A new study examines Federal CIO and CISO perceptions and usage experiences for CyberScope, the new Federal Information Security Management Act's (FISMA) online reporting portal. The Obama administrat...

QualysGuard integrates with Cyber-Ark's Privileged Identity Management Suite

Posted: 04 Oct 2010 05:31 AM PDT

Qualys and Cyber-Ark announced QualysGuard integration with Cyber-Ark's Privileged Identity Management (PIM) Suite. With this integration, customers can store and manage credentials required by ...

CSC acquires Vulnerability Research Labs

Posted: 04 Oct 2010 05:25 AM PDT

CSC has acquired the business of Vulnerability Research Labs (VRL), a privately held cyber threat intelligence firm. The acquisition enables CSC to enhance its cybersecurity support to public and comm...

Plane-tracking phone app is a boon for terrorists?

Posted: 04 Oct 2010 04:41 AM PDT

An application for the iPhone and Android-running devices that allows users to establish the exact location of an airplane by simply pointing it in its direction while it glides through the sky has ma...

The state of compliance

Posted: 04 Oct 2010 01:04 AM PDT

While credit card data breaches remain all too common, a new report from Verizon Business shows that following industry security standards can dramatically reduce such incidents. The report exami...

Event: Cloud Security Alliance Congress 2010

Posted: 04 Oct 2010 12:36 AM PDT

The Cloud Security Alliance, the world's leading organization on cloud security and MIS Training Institute are assembling top experts and industry stakeholders to discuss the state of cloud security a...

Week in review: Stuxnet, WoW phishing and ZeuS gangs smackdown

Posted: 03 Oct 2010 09:00 PM PDT

Here's an overview of some of last week's most interesting news, videos, articles and interviews: 60% of organizations suffered $2 million losses for Web 2.0 security issues While organizations ...

0 comments:

Post a Comment