Rogueware starts misusing names of legitimate AV

Rogueware starts misusing names of legitimate AV


Rogueware starts misusing names of legitimate AV

Posted: 01 Feb 2011 08:36 AM PST

Rogueware authors have so far mostly avoided misusing names of legitimate AV software, and I often wondered why. My best guess is that they wanted to minimize the possibility of some company sicking l...

Widespread "undelivered package" spam attack delivers Trojans

Posted: 01 Feb 2011 08:06 AM PST

Cybercriminals are currently sending out the spam messages – which come attached with a malware infected .zip file – with titles such as 'Post Express Service. Get the parcel' and 'Post Express Servic...

Governance has a central role in IT security

Posted: 01 Feb 2011 07:44 AM PST

A major survey from ISACA confirms the central role that governance plays in information security within large organizations and stresses the fact that 95% of IT professionals within major organizati...

SecureSurf: Malware protection and web filtering

Posted: 01 Feb 2011 07:40 AM PST

AppRiver introduced SecureSurf, a Web protection solution that provides defense against online threats. SecureSurf is an easy-to-deploy hosted solution that protects companies against online threat...

Egyptians can now tweet without an Internet connection

Posted: 01 Feb 2011 07:16 AM PST

After Facebook experienced the state-wide password hijacking attempt organized by the Tunisian government and solved it by using social authentication and routing login attempts coming from inside the...

"Facebook closing all accounts" scam hits users

Posted: 01 Feb 2011 06:24 AM PST

The latest scam to hit Facebook users is a slight variation of the survey scams that target them daily. But this time, the lure isn't bogus "OMG" I can't believe it!" content, but an announcement supp...

Could a vulnerability tax spur vendors to improve security?

Posted: 01 Feb 2011 05:30 AM PST

He has recently been appointed as Apple's global director of security and he is expected to begin his work in March, but former National Security Agency cryptographer and SANS instructor David Rice is...

Vulnerabilities in Cisco WebEx conferencing applications

Posted: 01 Feb 2011 12:22 AM PST

Core Security Technologies disclosed stack overflow vulnerabilities affecting the Cisco WebEx applications used to conduct Web-based video conferencing. They identified two vulnerabilities that can co...

Event: Infosecurity Europe 2011

Posted: 01 Feb 2011 12:16 AM PST

Infosecurity Europe is an event where information security professionals address the challenges of today whilst preparing for those of tomorrow. Attend free, cutting edge, peer led discussions and ...

0 comments:

Post a Comment