Facebook releases official Security Guide |
- Facebook releases official Security Guide
- Strategies for effective data analytics
- Trojanized Android app intercepts messages to hide costly subscriptions
- "Free 'Breaking Dawn Part 2' tickets" Facebook scam
- Emerging threats: Attacks via MIPS devices
- Confidence in online retailers sinks
- Coding for Penetration Testers
Facebook releases official Security Guide Posted: 19 Aug 2011 05:40 AM PDT Tired of having to explain to friends and family about the dangers lurking on Facebook? The social network has released an official Guide to Facebook Security, so share the link with them. The shor... |
Strategies for effective data analytics Posted: 19 Aug 2011 05:05 AM PDT Organizations with effective data analytics can make stronger business decisions by learning what is working and what is not, what they are doing well, and where they need improvement, according to IS... |
Trojanized Android app intercepts messages to hide costly subscriptions Posted: 19 Aug 2011 04:51 AM PDT Another trojanized Android app that monitors received text messages for keywords has been uncovered by Trend Micro, and this time, the feature is not used for spying but to allow the app to subscribe ... |
"Free 'Breaking Dawn Part 2' tickets" Facebook scam Posted: 19 Aug 2011 03:41 AM PDT The penultimate movie in The Twilight Saga has not yet arrived to cinemas, but cyber scammers have decided on an even bigger attraction to lure Internet users into sharing their personal information: ... |
Emerging threats: Attacks via MIPS devices Posted: 19 Aug 2011 12:07 AM PDT First of all, if something has already been invented and has been seen in-the-wild more than once, it's very likely to occur again and again, especially if the attacks were profitable for the cybercri... |
Confidence in online retailers sinks Posted: 18 Aug 2011 10:03 PM PDT According to a study of consumer sentiment toward online shopping and security by McAfee, only about a third of online consumers believe that most websites are safe for shopping, an 11 percent decreas... |
Coding for Penetration Testers Posted: 18 Aug 2011 09:03 PM PDT Tools used for penetration testing are often purchased off-the-shelf. Each tool is based on a programming language like Perl, JavaScript, Python, etc. If a penetration tester wants the tool to perf... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment