Ohio State University database hacked |
- Ohio State University database hacked
- Mozilla expands its bug bounty program
- Twitter spam campaign leads to computer-hijacking rogue AV
- Malicious .rtf file exploits MS Office flaw
- MySQL 5.5 released
- After the 2010 security tsunami, tips on how to survive 2011
- Voice encryption app for the iPhone
- Metasploit 3.5.1 adds Cisco device exploitation
- Ten tips for smartphone security
- Network access control system PacketFence 2.0 released
Ohio State University database hacked Posted: 16 Dec 2010 07:11 AM PST A database containing Social Security numbers, addresses and dates of birth of everyone who's ever had an Ohio State University e-mail address (@osu.edu) has been breached by unknown perpetrators but,... |
Mozilla expands its bug bounty program Posted: 16 Dec 2010 06:35 AM PST Back in 2004, the Mozilla Foundation instituted a bug bounty program that rewarded users who reported critical security vulnerabilities on the Foundation's software with $500 per bug. Six years later,... |
Twitter spam campaign leads to computer-hijacking rogue AV Posted: 16 Dec 2010 05:59 AM PST Malicious shortened goo.gl links and compromised accounts are once again used to lure users to pages that will ultimately harm their computer. A message saying "a very good antivirus" and offering ... |
Malicious .rtf file exploits MS Office flaw Posted: 16 Dec 2010 04:03 AM PST A stack-based buffer overflow vulnerability in Microsoft Office has recently been spotted being exploited in the wild by attackers aiming at getting control of targeted systems. The flaw has been ... |
Posted: 16 Dec 2010 04:02 AM PST MySQL 5.5 delivers significant enhancements enabling users to improve the performance and scalability of web applications across multiple operating environments, including Windows, Linux, Oracle Solar... |
After the 2010 security tsunami, tips on how to survive 2011 Posted: 16 Dec 2010 12:09 AM PST In-house and internal threats will be a big element of 2011 as organizations begin to understand that anti-virus, malware, and phishing software is no longer effective. There will be an epiphany that ... |
Voice encryption app for the iPhone Posted: 15 Dec 2010 10:45 PM PST Kryptos is a secure VoIP application for the iPhone. It utilizes 256-bit AES military grade encryption to encrypt voice communications between users, while using 1024-bit RSA encryption during the sym... |
Metasploit 3.5.1 adds Cisco device exploitation Posted: 15 Dec 2010 10:12 PM PST Metasploit now enables security professionals to exploit Cisco devices, performs passive reconnaissance through traffic analysis, provides more exploits and evaluates an organization's password securi... |
Ten tips for smartphone security Posted: 15 Dec 2010 09:21 PM PST With the holiday season in full swing, more people are using their smartphone for tasks such as last minute shopping, accessing bank accounts, connecting with friends or making shopping lists on their... |
Network access control system PacketFence 2.0 released Posted: 15 Dec 2010 09:03 PM PST PacketFence is a free and open source network access control (NAC) system. It can be used to effectively secure networks - from small to very large heterogeneous networks. PacketFence has been deploye... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment