Hotmail flaw allows attackers to exfiltrate emails |
- Hotmail flaw allows attackers to exfiltrate emails
- Fake VirusTotal site serves malware
- IBM WebSphere Portal XSS vulnerability
- Spammers establish their own fake URL-shortening services
- LinkedIn security flaws allow account hijacking
- US communications privacy law in for a change?
- Cybercrime statistics show widespread phishing problem
- The rise of layered fraud prevention
- Mobile users: Risky behavior and weak security
- iPhone hardware encryption investigated
Hotmail flaw allows attackers to exfiltrate emails Posted: 24 May 2011 09:11 AM PDT The analysis of a recent targeted attack against webmail users has led Trend Micro researchers to discover a vulnerability in Microsoft's Hotmail webmail service that allowed attackers to siphon conta... |
Fake VirusTotal site serves malware Posted: 24 May 2011 08:36 AM PDT VirusTotal - the popular free file checking website - has been spoofed by malware peddlers, warns Kaspersky Lab. A simple visit to the site triggers the download of a worm via a java applet embedde... |
IBM WebSphere Portal XSS vulnerability Posted: 24 May 2011 07:24 AM PDT A vulnerability has been reported in IBM WebSphere Portal, which can be exploited by malicious people to conduct cross-site scripting attacks, according to Secunia. Certain input passed to the sear... |
Spammers establish their own fake URL-shortening services Posted: 24 May 2011 07:08 AM PDT For the first time ever, spammers are establishing their own their own fake URL-shortening services to perform URL redirection, according to Symantec. This new spamming activity has contributed to ... |
LinkedIn security flaws allow account hijacking Posted: 24 May 2011 06:58 AM PDT LinkedIn users are in danger of having their their account hijacked when accessing it over insecure Wi-Fi networks or public computers, says independent security researcher Rishi Narang, and it's all ... |
US communications privacy law in for a change? Posted: 24 May 2011 05:38 AM PDT As technology speeds progressively forward, privacy laws need to get updated. As the amount of information we share and keep online - on social networks, stored in cloud services or on mail servers... |
Cybercrime statistics show widespread phishing problem Posted: 24 May 2011 02:51 AM PDT The top five industries vulnerable to cybercrime include travel, education, financial services, government services and IT services, according to KnowBe4. Using the Inc.com website to obtain domain... |
The rise of layered fraud prevention Posted: 24 May 2011 01:28 AM PDT By 2014, 15 percent of enterprises will adopt layered fraud prevention techniques for their internal systems to compensate for weaknesses inherent in using only authentication methods, according to Ga... |
Mobile users: Risky behavior and weak security Posted: 24 May 2011 12:58 AM PDT Researchers found that while an increasing number of consumers use mobile devices for both business and personal activities, large numbers are not familiar with their employer's corporate policy on th... |
iPhone hardware encryption investigated Posted: 24 May 2011 12:50 AM PDT Users of Apple iPhone devices accumulate huge amounts of highly sensitive information stored in their smartphones. Historical geolocation data, viewed Google maps and routes, Web browsing history a... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment