90 people arrested for organized eBay fraud |
- 90 people arrested for organized eBay fraud
- Apple iDisk users targeted by phishers
- Is WordPress next in line for silent updates?
- Did U.K. journalists use malware to spy on people?
- Google+ related scams move to Facebook
- Mitigating software vulnerabilities
- Practical steps to improve your corporate security posture
- Trend Micro expands SecureCloud
- Apache Tomcat security bypass vulnerability
90 people arrested for organized eBay fraud Posted: 14 Jul 2011 09:54 AM PDT 90 suspects belonging to three different cyber fraud gangs have been arrested following a coordinated action by the Romanian Directorate for the Investigation of Organized Crime and Terrorism (DIICOT)... |
Apple iDisk users targeted by phishers Posted: 14 Jul 2011 08:02 AM PDT Users of iDisk - Apple's paid online file-hosting service bundled up in the MobileMe package - are being targeted by phishers, warns Symantec. Its researchers have recently discovered a string of p... |
Is WordPress next in line for silent updates? Posted: 14 Jul 2011 08:02 AM PDT Silent software updates are still a topic of contention in the security world, but the successful implementation of the process by Google for its Chrome browser has definitely proved that it's an opti... |
Did U.K. journalists use malware to spy on people? Posted: 14 Jul 2011 07:21 AM PDT The scandal that led to the demise of U.K. newspaper News of the World and to an investigation into the illegal methods used by journalists and editors in order to acquire information seems not to be ... |
Google+ related scams move to Facebook Posted: 14 Jul 2011 04:45 AM PDT Scammers continue to take advantage of the great interest raised by the introduction of Google+ and have begun tricking Facebook users into giving them access to their accounts via a rogue application... |
Mitigating software vulnerabilities Posted: 14 Jul 2011 04:00 AM PDT Microsoft released a new whitepaper that describes how exploit mitigation technologies can help reduce or eliminate risk, prevent attacks and minimize operational disruption due to software vulnerabil... |
Practical steps to improve your corporate security posture Posted: 14 Jul 2011 03:18 AM PDT Sony, Lockheed Martin, Nintendo, Groupon - In fact we could go on and on. Financial services, government agencies, health care records - It doesn't matter. According to a report I read last last week... |
Trend Micro expands SecureCloud Posted: 14 Jul 2011 03:00 AM PDT Trend Micro SecureCloud, the encryption service with policy-based key management, has been expanded with a new offering designed for cloud service providers, as well as encryption support for VMware v... |
Apache Tomcat security bypass vulnerability Posted: 14 Jul 2011 02:10 AM PDT A security issue and a vulnerability have been reported in Apache Tomcat, which can be exploited by malicious, local users to bypass certain security restrictions or cause a DoS, according to Secunia. |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment