Hackers steal, publish Fox employee passwords |
- Hackers steal, publish Fox employee passwords
- Obama administration reveals cybersecurity plan
- First mobile wireless storage for iOS
- PC Lock protects from identity theft, privacy invasion
- PSN attackers allegedly used Amazon cloud for attack
- Unattended Linux VM configuration tool for Hyper-V
- Five ways to migrate applications to the cloud
- Chromebook: A new class of risks
- The rise of rogue AV
- Automated solution for patching software vulnerabilities
- Free check verification and validation of bank accounts
- Week in review: Leaking Facebook apps, Chrome sandbox cracked and explosion of Android malware
Hackers steal, publish Fox employee passwords Posted: 16 May 2011 06:37 AM PDT A group of attackers who clearly have it in for Fox Broadcasting have managed to access a company server with hundreds of their employees' email usernames and passwords. Then they published the c... |
Obama administration reveals cybersecurity plan Posted: 16 May 2011 06:25 AM PDT The Obama administration has issued a new legislative proposal that contains a number of steps it thinks critical to improving cybersecurity for U.S. citizens, the nation's critical infrastructure and... |
First mobile wireless storage for iOS Posted: 16 May 2011 06:17 AM PDT Seagate announced GoFlex Satellite mobile wireless storage, the first battery-powered external hard drive to wirelessly extend the storage capacity of any Wi-Fi enabled mobile device. With 500GB ... |
PC Lock protects from identity theft, privacy invasion Posted: 16 May 2011 03:52 AM PDT Laplink released PC Lock, data encryption software with cloud management. Its Web Management Console lets users modify preferences, change settings, reset passwords, lock the data on a missing or... |
PSN attackers allegedly used Amazon cloud for attack Posted: 16 May 2011 03:27 AM PDT Attackers (mis)used the Amazon cloud to mount their attack against Sony's online services and systems, and they did it legally, says Bloomberg. According to an unnamed source, the attackers used... |
Unattended Linux VM configuration tool for Hyper-V Posted: 16 May 2011 02:40 AM PDT Set-LinuxVM is a tool provided as a Windows PowerShell module which is able to create Linux Virtual Machines on a Hyper-V host. It supports Debian, Ubuntu, CentOS, Fedora, Redhat and Suse. What y... |
Five ways to migrate applications to the cloud Posted: 16 May 2011 01:17 AM PDT Organizations seeking to move applications into the cloud have five options: rehost on infrastructure as a service (IaaS), refactor for platform as a service (PaaS), revise for IaaS or PaaS, rebuild o... |
Chromebook: A new class of risks Posted: 16 May 2011 12:43 AM PDT We are certainly living in interesting times. It was less than a week ago that a rumor appeared that Apple is going to switch to ARM processors for its next generation of laptops. Obviously, this h... |
Posted: 16 May 2011 12:06 AM PDT April saw a continued increase in the volume of detected malware, with 73,000 new variants of threats being released daily - a 26 percent increase over the same period last year, according to GFI Soft... |
Automated solution for patching software vulnerabilities Posted: 15 May 2011 09:42 PM PDT A universal law enforcement axiom states that criminals prefer to trespass through vulnerable open or unlocked doors or windows. In the IT and software industries, the same rule prevails. Approximatel... |
Free check verification and validation of bank accounts Posted: 15 May 2011 09:15 PM PDT Recent Federal Trade Commission activity is undeniable evidence for increased concern of the public in connection with unauthorized check creation and fraud conducted by organized scammers and con art... |
Week in review: Leaking Facebook apps, Chrome sandbox cracked and explosion of Android malware Posted: 15 May 2011 09:00 PM PDT Here's an overview of some of last week's most interesting news, interviews, videos and articles: Files uploaded to file hosting services accessed by malicious individuals File hosting services ... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment