Malaysian hacker breached Federal Reserve and DoD contractor networks |
- Malaysian hacker breached Federal Reserve and DoD contractor networks
- Google Apps Script API flaw allowed attacker to impersonate Google
- Are malware hybrids the next big threat?
- Security, privacy and the generation gap
- Apple releases iOS 4.2
- 10 tips for securely managing e-mail
- Corporate laptops unprotected against theft or data loss
- How to choose a web vulnerability scanner
- NetBSD 5.1 released, security fixes abound
- Agnitio: Security code review tool
- Week in review: Cybercrime victims, PayPal phishing and Moxie Marlinspike
Malaysian hacker breached Federal Reserve and DoD contractor networks Posted: 22 Nov 2010 11:40 AM PST When agents arrested Malasyian Lin Mun Poo on account of selling US$1,000 worth of stolen credit card numbers just hours after he arrived in the U.S., they probably weren't expecting to find on his la... |
Google Apps Script API flaw allowed attacker to impersonate Google Posted: 22 Nov 2010 09:50 AM PST Details about a recently discovered and exploited vulnerability that allowed a 21-year-old Armenian hacker to harvest GMail addresses and send to their owners a message coming from a legitimate Google... |
Are malware hybrids the next big threat? Posted: 22 Nov 2010 09:28 AM PST Recent encounters with hybridized malware files have left Trend Micro researchers wondering if they have been designed that way or if they are just an undesirable side effect lurking from heavily infe... |
Security, privacy and the generation gap Posted: 22 Nov 2010 09:07 AM PST In the video below, Bruce Schneier talks about social networking sites and the future of privacy at the HEAnet National Networking Conference 2010 in Ireland. ... |
Posted: 22 Nov 2010 08:54 AM PST iOS 4.2 is available for download for iPad, iPhone and iPod touch. iOS 4.2 brings over 100 new features from iOS 4.0, 4.1 and 4.2 to iPad including Multitasking, Folders, Unified Inbox, Game Center, A... |
10 tips for securely managing e-mail Posted: 22 Nov 2010 04:18 AM PST "As an IT manager, looking after your company email can be a major headache. Being one of the primary portals for security threats and other IT issues, it is vital that email is properly managed to pr... |
Corporate laptops unprotected against theft or data loss Posted: 22 Nov 2010 03:36 AM PST Over half of UK public and private sector organizations are at risk of data breaches, losses and leaks from portable PCs and devices, according to Check Point. A total of 52% of respondents said they ... |
How to choose a web vulnerability scanner Posted: 22 Nov 2010 03:30 AM PST Robert Abela is a Technical Manager at Acunetix and in this interview he discusses the process of choosing a web vulnerability scanner and underlines several factors that should be taken into consider... |
NetBSD 5.1 released, security fixes abound Posted: 22 Nov 2010 02:41 AM PST NetBSD 5.1 represents a selected subset of fixes deemed critical for security or stability reasons, as well as new features and enhancements. Security advisory fixes:NetBSD-SA2009-004, NetBSD OpenP... |
Agnitio: Security code review tool Posted: 22 Nov 2010 02:18 AM PST Agnitio is an application security tool developed by David Rook to help further the adoption of the Principles of Secure Development and to bring more repeatability and integrity to security code revi... |
Week in review: Cybercrime victims, PayPal phishing and Moxie Marlinspike Posted: 21 Nov 2010 11:50 PM PST Here's an overview of some of last week's most interesting news and interviews: Top 10 security threats for 2011 Imperva announced their predictions for the top ten security trends for 2011 whic... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment