Exploit kit with integrated AV checker

Exploit kit with integrated AV checker


Exploit kit with integrated AV checker

Posted: 01 Dec 2010 10:46 AM PST

The latest version of the relatively new "Siberia Exploits Kit" has an interesting feature that must make it pretty popular among criminals - a built in AV checker: With it, one can check which m...

WikiLeaks and Assange under attack

Posted: 01 Dec 2010 08:40 AM PST

While WikiLeaks' site is still being bombarded with requests at a speed of 10 gigabits per second - making access to it very difficult and at moments even impossible - ars technica reports that its o...

WordPress 3.0.2 hardens security

Posted: 01 Dec 2010 06:47 AM PST

WordPress 3.0.2 is available and is a mandatory security update for all previous WordPress versions. This maintenance release fixes a moderate security issue that could allow a malicious Author-l...

Game teaches consumers about Internet security concerns

Posted: 01 Dec 2010 06:41 AM PST

Trend Micro released Titanium Power Up, an online video game designed to challenge negative perceptions of Internet security with unexpected humor and personality. Titanium Power Up is reminiscen...

Deployments of HSPA+ and LTE networks will Impact communications in 2011

Posted: 01 Dec 2010 06:26 AM PST

Deployments of HSPA+ and LTE networks will have a huge impact on all sectors of the communications industry next year, according to M/C Venture Partners. Mobile services will enhance the experience of...

EventTracker 7.1 alerts users to security breaches

Posted: 01 Dec 2010 06:18 AM PST

Prism Microsystems released EventTracker 7.1 with enhanced features including USB and writeable media monitoring. The proliferation of writeable media devices such as USB thumb drives and CD/DVD-W ...

Amazon profiles abused by spammers and malware pushers

Posted: 01 Dec 2010 05:45 AM PST

Experience has proven that if a site enables users to contribute content, this feature will be abused by those who want to push their own agenda - usually spammers. This has also proven to be corr...

Facebook's recurring nuisance - the recycled scam

Posted: 01 Dec 2010 04:59 AM PST

Every now and then, a new Facebook scam pops up that takes advantage of the users' curiosity and lures them in by promising to allow them to view who has visited their profile. It is actually amazing ...

Using social networks safely

Posted: 01 Dec 2010 02:33 AM PST

Everyone uses social networks like Facebook, Twitter or LinkedIn. Although these fantastic sites do have their upside, they also open users up to more computer viruses and online threats that may go b...

New book: Web Application Obfuscation

Posted: 30 Nov 2010 09:09 PM PST

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hun...

New consortium to improve security products

Posted: 30 Nov 2010 09:03 PM PST

ICSA Labs has founded the Endpoint Security Consortium to help improve enterprise endpoint security products industrywide. The mission of the consortium is to create publicly vetted, objective and ...

0 comments:

Post a Comment