Most businesses vulnerable to cache poisoning attacks |
- Most businesses vulnerable to cache poisoning attacks
- Tracking a pirated software license
- Doorways on non-default ports make compromised websites harder to spot
- Growth in social networking, mobile and infrastructure attacks
- Juniper Networks acquires Altor Networks
- McAfee's Secure Short URL Service not so secure
- How new Facebook user profiles impact privacy
- Review: Securing the Smart Grid: Next Generation Power Grid Security
- Dropbox 1.0.0 RC: Selective sync, bug fixes and improvements
- What happened to WikiLeaks over the weekend?
- Amazon launches new DNS service in the cloud
- Federated voice biometric database to secure and authenticate e-money
- Week in review: WikiLeaks developments, rich scammers and ATM infections
Most businesses vulnerable to cache poisoning attacks Posted: 06 Dec 2010 10:59 AM PST While DNSSEC adoption percentages appear to have increased dramatically by 340 percent this year, the actual number of zones that have been signed is very small: .02 percent, according to a study by I... |
Tracking a pirated software license Posted: 06 Dec 2010 10:33 AM PST When Avast Software spotted a license for its avast! Pro Antivirus software being distributed online, they decided to do a simple experiment - they didn't take any action that would curb its spread, a... |
Doorways on non-default ports make compromised websites harder to spot Posted: 06 Dec 2010 08:47 AM PST Are negligent site and server administrators at least as much to blame for compromised sites that redirect users to doorway pages to pirated software as the cyber criminals that took advantage of thei... |
Growth in social networking, mobile and infrastructure attacks Posted: 06 Dec 2010 08:07 AM PST IID released its list of the top enterprise security trends for 2011. Some specific areas that will have significant spikes in attacks are social networking, mobile, and enterprise infrastructure. ... |
Juniper Networks acquires Altor Networks Posted: 06 Dec 2010 07:59 AM PST Juniper Networks has acquired Altor Networks, a provider of virtualization security technology that enables organizations to secure the virtualized world. Under the terms of the agreement, Juniper ... |
McAfee's Secure Short URL Service not so secure Posted: 06 Dec 2010 07:24 AM PST When the people at McAfee decided to launch its own URL-shortening service (mcaf.ee), they touted it as "secure" - meaning, that it would guarantee that the shortened link isn't malicious by scanning ... |
How new Facebook user profiles impact privacy Posted: 06 Dec 2010 06:58 AM PST Facebook today announced its New Profile, designed to help users share their experiences, discover common interests and highlight meaningful relationships. The service will be rolled out across Facebo... |
Review: Securing the Smart Grid: Next Generation Power Grid Security Posted: 06 Dec 2010 06:00 AM PST Authors: Tony Flick and Justin Morehouse Pages: 320 Publisher: Syngress ISBN: 1597495700 Introduction Smart grids are a reality and the future, and they promise greater reliability, affor... |
Dropbox 1.0.0 RC: Selective sync, bug fixes and improvements Posted: 06 Dec 2010 05:46 AM PST The popular online backup, file sync and sharing service Dropbox released version 1.0.0 RC of their desktop client. Here's what has been fixed since 0.8.114:Stop the Dropbox location changer widg... |
What happened to WikiLeaks over the weekend? Posted: 06 Dec 2010 04:08 AM PST It has been a busy weekend for WikiLeaks. Their latest release made public a list of assets of strategic importance to the US, which are located across the globe. And while the US, British and othe... |
Amazon launches new DNS service in the cloud Posted: 06 Dec 2010 02:21 AM PST Amazon Web Services announced Route 53, a DNS web service giving a way to route Internet traffic to web applications by translating human readable names into numeric IP addresses. Amazon Route 53... |
Federated voice biometric database to secure and authenticate e-money Posted: 06 Dec 2010 02:16 AM PST Voice Commerce launched KYC Secure, a federated database developed to secure and authenticate a consumer's identity over their mobile phone. The first regulated mobile identity database of its kind, K... |
Week in review: WikiLeaks developments, rich scammers and ATM infections Posted: 06 Dec 2010 01:40 AM PST Here's an overview of some of last week's most interesting news, articles and interviews: Release of diplomatic cables reveals Aurora attacks instigator Among the various interesting things that... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment