The secure coding practices quick reference guide |
- The secure coding practices quick reference guide
- Man makes career out of suing e-mail spammers
- Multiple vulnerabilities in IBM Lotus Mobile Connect
- The criminal in your browser is real
- Carders.cc, Exploit-db.org and others hacked on Christmas
- The security landscape from 2010 to 2011
- Week in review: DDoS attacks, anti-Facebook worm and identity in the digital age
The secure coding practices quick reference guide Posted: 27 Dec 2010 05:36 AM PST In the video below, Keith Turpin talks about the secure coding practices quick reference guide. It's a technology agnostic set of general software security coding practices, in a comprehensive checkli... |
Man makes career out of suing e-mail spammers Posted: 27 Dec 2010 05:12 AM PST There may be a lot people who thought about it, but there is one who decided to actually do it - Daniel Balsam from San Francisco quit his job and started his new career: suing spamming companies. ... |
Multiple vulnerabilities in IBM Lotus Mobile Connect Posted: 27 Dec 2010 05:04 AM PST A weakness and two vulnerabilities have been reported in IBM Lotus Mobile Connect, according to Secunia. These can be exploited by malicious people with physical access to bypass certain security rest... |
The criminal in your browser is real Posted: 27 Dec 2010 04:40 AM PST Evidence is everywhere that cyber criminals exist, and they're able to make a substantial living from their illegal activities. While it is true that many are focusing their efforts on individuals, ot... |
Carders.cc, Exploit-db.org and others hacked on Christmas Posted: 27 Dec 2010 03:51 AM PST Waking up on Christmas morning and finding out you've been hacked must be pretty annoying, and that it what happened to the administrators of Carders.cc - an underground online forum where stolen cred... |
The security landscape from 2010 to 2011 Posted: 27 Dec 2010 03:51 AM PST Vendor-neutral testing and certification firm ICSA Labs offers its thoughts on the security landscape spanning 2010 and 2011. Mobile security 1. While most hackers heavily focused on Nokia's ... |
Week in review: DDoS attacks, anti-Facebook worm and identity in the digital age Posted: 27 Dec 2010 02:18 AM PST Here's an overview of some of last week's most interesting news, interviews, videos, reviews and articles: How to keep mobile devices secure while traveling 'Tis the season to be jolly and to ... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment