Fake browser updates deliver fake AV or exploit kit

Fake browser updates deliver fake AV or exploit kit


Fake browser updates deliver fake AV or exploit kit

Posted: 05 Oct 2010 07:39 AM PDT

Not that long ago, Microsoft was warning users about rogue AV peddlers using compromised websites and fake browser warnings to urge them to download an "upgrade"/"solution for malware protection". ...

How to block Flash in Safari

Posted: 05 Oct 2010 06:00 AM PDT

I have been a satisfied Mac user for quite some time now. What I really love about Macs is that they just work. When you spend 10+ hours a day on your computer, you need for everything to run without ...

Qualys acquires Nemean Networks

Posted: 05 Oct 2010 05:23 AM PDT

Qualys announced the acquisition of Nemean Networks,completed on August 31, 2010. This acquisition will expand Qualys' research capabilities further into intrusion and malware detection, and allows th...

Free iPhone rogue applications on Facebook

Posted: 05 Oct 2010 05:10 AM PDT

Sophos is warning Facebook users about messages currently circulating on the social network claiming that friends have received free iPhones. These messages, which have been spreading widely sinc...

Security exercise for information infrastructure protection

Posted: 05 Oct 2010 04:00 AM PDT

"Cyber Europe 2010" - the first pan European CIIP (Critical Information Infrastructure Protection) exercise that will test the efficiency of communication links and procedures between different Member...

Finding and managing SSL digital certificates

Posted: 05 Oct 2010 02:08 AM PDT

Digital certificates are now cornerstones to business technology. Located on servers, devices, networks and communication platforms, they represent a necessary security technique for encrypting transm...

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Posted: 05 Oct 2010 01:56 AM PDT

Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests b...

Snort 2.9.0 released

Posted: 05 Oct 2010 01:50 AM PDT

Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/...

New encryption offerings from Symantec

Posted: 05 Oct 2010 12:17 AM PDT

Symantec announced the expansion of its encryption solution set with the planned launch of PGP Whole Disk Encryption with support for Intel Anti-Theft Technology, Symantec Endpoint Encryption (SEE) Re...

Massive iTunes phishing attack

Posted: 04 Oct 2010 09:00 PM PDT

Apple's popular iTunes platform has become a major target for hackers looking to steal credit card data from the service's millions of users. Victims receive a cleverly-crafted email informing them...

0 comments:

Post a Comment