Fake browser updates deliver fake AV or exploit kit |
- Fake browser updates deliver fake AV or exploit kit
- How to block Flash in Safari
- Qualys acquires Nemean Networks
- Free iPhone rogue applications on Facebook
- Security exercise for information infrastructure protection
- Finding and managing SSL digital certificates
- Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
- Snort 2.9.0 released
- New encryption offerings from Symantec
- Massive iTunes phishing attack
Fake browser updates deliver fake AV or exploit kit Posted: 05 Oct 2010 07:39 AM PDT Not that long ago, Microsoft was warning users about rogue AV peddlers using compromised websites and fake browser warnings to urge them to download an "upgrade"/"solution for malware protection". ... |
Posted: 05 Oct 2010 06:00 AM PDT I have been a satisfied Mac user for quite some time now. What I really love about Macs is that they just work. When you spend 10+ hours a day on your computer, you need for everything to run without ... |
Qualys acquires Nemean Networks Posted: 05 Oct 2010 05:23 AM PDT Qualys announced the acquisition of Nemean Networks,completed on August 31, 2010. This acquisition will expand Qualys' research capabilities further into intrusion and malware detection, and allows th... |
Free iPhone rogue applications on Facebook Posted: 05 Oct 2010 05:10 AM PDT Sophos is warning Facebook users about messages currently circulating on the social network claiming that friends have received free iPhones. These messages, which have been spreading widely sinc... |
Security exercise for information infrastructure protection Posted: 05 Oct 2010 04:00 AM PDT "Cyber Europe 2010" - the first pan European CIIP (Critical Information Infrastructure Protection) exercise that will test the efficiency of communication links and procedures between different Member... |
Finding and managing SSL digital certificates Posted: 05 Oct 2010 02:08 AM PDT Digital certificates are now cornerstones to business technology. Located on servers, devices, networks and communication platforms, they represent a necessary security technique for encrypting transm... |
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques Posted: 05 Oct 2010 01:56 AM PDT Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests b... |
Posted: 05 Oct 2010 01:50 AM PDT Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/... |
New encryption offerings from Symantec Posted: 05 Oct 2010 12:17 AM PDT Symantec announced the expansion of its encryption solution set with the planned launch of PGP Whole Disk Encryption with support for Intel Anti-Theft Technology, Symantec Endpoint Encryption (SEE) Re... |
Massive iTunes phishing attack Posted: 04 Oct 2010 09:00 PM PDT Apple's popular iTunes platform has become a major target for hackers looking to steal credit card data from the service's millions of users. Victims receive a cleverly-crafted email informing them... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment