HBGary breach revelations and repercussions |
- HBGary breach revelations and repercussions
- Multiple vulnerabilities in Django
- Credit score checking app triggers Trojan download
- iPhones and iPads reveal passwords regardless of passcode protection
- Van Gogh Museum fan page hit by Facebook scammers
- IBM secures mobile and instrumented devices
- 400,000 e-mail addresses stolen in Irish job website breach
- Security service for Android and Symbian
- 7 critical questions to ask before developing a social media policy
- Immunet 3.0 introduces custom anti-malware signatures
- Network situational awareness and retro analysis
HBGary breach revelations and repercussions Posted: 10 Feb 2011 09:36 AM PST A few days ago, the Internet group Anonymous downed security firm HBGary's website and breached its networks, downloading a serious amount of confidential information (e-mails, malware data, financial... |
Multiple vulnerabilities in Django Posted: 10 Feb 2011 08:32 AM PST Vulnerabilities have been reported in Django, which can be exploited by malicious people to bypass certain security restrictions and conduct script insertion and cross-site request forgery attacks, ac... |
Credit score checking app triggers Trojan download Posted: 10 Feb 2011 06:51 AM PST The main reason people get scammed and/or their computer infected online is because they can't contain their curiosity, and that is precisely the thing on which the peddlers of a small application for... |
iPhones and iPads reveal passwords regardless of passcode protection Posted: 10 Feb 2011 05:09 AM PST Losing your iPhone or iPad equals having your passwords compromised - even if the device is protected with a passcode. The results of an experiment conducted by Jens Heider and Matthias Boll, two r... |
Van Gogh Museum fan page hit by Facebook scammers Posted: 10 Feb 2011 05:06 AM PST The Facebook page for the Van Gogh Museum in Amsterdam has been targeted by scammers. Messages were posted on the compromised page, including links to a version of the money-making scam "I was logg... |
IBM secures mobile and instrumented devices Posted: 10 Feb 2011 03:53 AM PST IBM announced new initiatives to extend security to the growing number of mobile and instrumented devices beyond an organization's own four walls, such as smartphones, ATMs, retail kiosks, traffic sys... |
400,000 e-mail addresses stolen in Irish job website breach Posted: 10 Feb 2011 03:28 AM PST Names and e-mail addresses of some 400,000 job seekers have been harvested by hackers who have breached the RecruitIreland.com site and its systems. The site has been taken offline for a while, and... |
Security service for Android and Symbian Posted: 10 Feb 2011 03:26 AM PST The new version of F-Secure's Protection Service for Mobile (PSM 7) enables operators to offer protection and parental control for their customers' mobile devices. As more and more children, teen... |
7 critical questions to ask before developing a social media policy Posted: 10 Feb 2011 03:21 AM PST Social media disrupts the long-standing rules of business in many ways, but crafting a social media policy is premature unless the designers of the policy answer seven critical questions first. Gar... |
Immunet 3.0 introduces custom anti-malware signatures Posted: 10 Feb 2011 12:50 AM PST Sourcefire released Immunet 3.0 which enables users to create custom anti-malware signatures for more accurate protection against targeted attacks and offers a Cloud Recall feature, which can remediat... |
Network situational awareness and retro analysis Posted: 10 Feb 2011 12:23 AM PST Trisul is a Linux based application that passively listens to network traffic and tracks a number of traffic metrics across all layers. It correlates these traffic metrics with raw flow data and full ... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment