Microsoft patches record 40 vulnerabilities |
- Microsoft patches record 40 vulnerabilities
- New Trojan hijacks shortcuts to ensure its execution
- Fake Hallmark greeting card carries malware
- Julian Assange granted bail
- 2010: The year of the vulnerability
- Hacktivism and social engineering emerge as top threats
- Event: 23rd Annual FIRST Conference on Computer Security and Incident Response
- Top wireless security trends for 2011
- Smart grid cyber security in 2011: Untenable meets intractable
- Metasploit achieves CVE compliance
Microsoft patches record 40 vulnerabilities Posted: 14 Dec 2010 11:57 AM PST Today Microsoft released 17 security bulletins which address 40 vulnerabilities affecting Microsoft Office, Windows, Internet Explorer, SharePoint Server and Exchange. This brings the total count f... |
New Trojan hijacks shortcuts to ensure its execution Posted: 14 Dec 2010 10:53 AM PST A new information-stealing Trojan that seems to be Chinese in origin has been detected by Avira' researchers. It is designed to steal usernames and passwords associated with a variety of popular we... |
Fake Hallmark greeting card carries malware Posted: 14 Dec 2010 09:26 AM PST A spam campaign consisting of e-mails posing as Hallmark Christmas cards and containing a malicious attachment has been detected by MX Lab researchers: Coming from a spoofed card@hallmark.com a... |
Posted: 14 Dec 2010 09:00 AM PST WikiLeaks founder and director Julian Assange has been granted bail and will likely be freed in the next few days - as soon as the £240,000 in security are raised and delivered. The judge deci... |
2010: The year of the vulnerability Posted: 14 Dec 2010 06:00 AM PST The year 2010 has been almost identical to the previous one in terms of malware evolution. Generally speaking, trends have not changed that much and nor have the targets for attack, though certain mal... |
Hacktivism and social engineering emerge as top threats Posted: 14 Dec 2010 05:29 AM PST Hacktivism and more profit-oriented malware, social engineering and malicious codes with the ability to adapt to avoid detection will be the main threats in the coming year, according to PandaLabs. Th... |
Event: 23rd Annual FIRST Conference on Computer Security and Incident Response Posted: 14 Dec 2010 01:55 AM PST The Forum of Incident Response and Security Teams (FIRST) is a global non-profit organization dedicated to bringing together computer security incident response teams (CSIRTs) and includes response te... |
Top wireless security trends for 2011 Posted: 13 Dec 2010 10:09 PM PST Today's security needs are different than they were a decade ago. People are 'connected' thanks to mobile devices so they can stay linked to their security and data systems in real time. When security... |
Smart grid cyber security in 2011: Untenable meets intractable Posted: 13 Dec 2010 09:30 PM PST In the presentation below, you can listen to Andy Bochman, the Energy Security Lead at IBM, looking back and looking forward on smart grid cyber security. Andy takes a look at the most important ... |
Metasploit achieves CVE compliance Posted: 13 Dec 2010 09:03 PM PST Rapid7 announced that Metasploit Pro and Metasploit Express have achieved Common Vulnerabilities and Exposures (CVE) compliance. CVE associates unique identifiers to security vulnerabilities and ex... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment