US will consider cyber attacks as acts of war |
- US will consider cyber attacks as acts of war
- Flashback: Encrypted backups for Android
- Auto-dialing Trojans migrate to Android devices
- Employee-owned mobile devices are riskiest
- 26 trojanized apps pulled from Android Market
- The most active first quarter in malware history
- Facebook users targeted with OS aware fake AV attack
- Wireshark 1.4.7 released
- Social networking safety tips for kids
US will consider cyber attacks as acts of war Posted: 01 Jun 2011 10:10 AM PDT The US is finally working on a formal strategy on how to deal with cyber attacks against its networks, systems or infrastructure, and so far it seems it is one that will concentrate on deterrence. ... |
Flashback: Encrypted backups for Android Posted: 01 Jun 2011 09:51 AM PDT Flashback provides encrypted backups to the cloud, giving you reliable access to your data along with the peace of mind that it's secure. Flashback allows you to backup your entire android system... |
Auto-dialing Trojans migrate to Android devices Posted: 01 Jun 2011 08:20 AM PDT Auto-dialing malware has migrated from Symbian devices to Android ones, warns NetQin Mobile researchers. The Trojan has been spotted embedded in over 20 Android applications offered for download on... |
Employee-owned mobile devices are riskiest Posted: 01 Jun 2011 07:23 AM PDT More than half of information technology leaders in the US believe that any employee-owned mobile device poses a greater risk to the enterprise than mobile devices supplied by the company, according t... |
26 trojanized apps pulled from Android Market Posted: 01 Jun 2011 07:01 AM PDT 26 applications containing a variation of the DroidDream Trojan have been found on the official Android Market and are believed to have been downloaded by at least 30,000 users. Lookout researchers... |
The most active first quarter in malware history Posted: 01 Jun 2011 05:34 AM PDT With six million unique samples of recorded malware, Q1 2011 was the most active first quarter in malware history, according to McAfee. The report revealed many of the trends that had a significant... |
Facebook users targeted with OS aware fake AV attack Posted: 01 Jun 2011 05:00 AM PDT Fake AV peddlers have begun using Facebook to drive traffic to the malicious site that tries to trick users into believing their computer is infected. With subject lines like "IMF boss Dominique St... |
Posted: 01 Jun 2011 04:43 AM PDT Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. The following vulnerabilities have been fixed: Large/infinite loop in th... |
Social networking safety tips for kids Posted: 01 Jun 2011 02:57 AM PDT "Many parents are rightfully concerned about their kid's participation in social networks. There are a number of areas to be concerned with. Who are the kids talking to? Parents might worry about the ... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment