Hackers raid mass killer's email accounts for info

Hackers raid mass killer's email accounts for info


Hackers raid mass killer's email accounts for info

Posted: 09 Aug 2011 12:57 PM PDT

After the recent hacking of Norwegian mass killer Anders Breivik Behring's Twitter account, it seems that the same group of hackers has also decided to compromise two of his email accounts. They ...

Microsoft releases 13 security bulletins, fixes 22 vulnerabilities

Posted: 09 Aug 2011 11:24 AM PDT

Today Microsoft released 13 security bulletins, two rated Critical, nine Important and two Moderate. These bulletins address 22 unique vulnerabilities in Internet Explorer, Microsoft .NET Framework, M...

4,300+ compromised WordPress blogs poison Google Image Search results

Posted: 09 Aug 2011 08:45 AM PDT

Google Image Search has for a while now been littered with images that lure users to compromised sites that serve as doorway pages to other malicious sites. Part of the problem is that these com...

FBI officials become spam targets

Posted: 09 Aug 2011 06:58 AM PDT

Various government agencies and high ranking government officials have been the target of previous spam attacks. In their attempts to lure victims, criminals continue to explore new avenues to obtain ...

Facebook mobile users get password reset option

Posted: 09 Aug 2011 06:55 AM PDT

Facebook has announced it will be adding a very welcome security feature for the 250 million users accessing the social network through their mobile devices - the password reset option: "If you e...

Social networking users becoming privacy aware

Posted: 09 Aug 2011 06:47 AM PDT

A vast majority of computer users do not post vacation memories via social networks, according to a recent survey by Avira. During a June 2011 survey of its customers, overwhelmingly 64 percent o...

Parental control software for smartphones

Posted: 09 Aug 2011 05:54 AM PDT

Code9 Mobile launched Code9 Mobile, a smartphone application that enables families to establish acceptable cell phone usage rules so kids learn to use their mobile devices in a responsible way while m...

What really breaks SSL?

Posted: 09 Aug 2011 05:38 AM PDT

After years of being ignored -- which is an unusual situation for the protocol that secures the Web -- SSL became the focus of the interests of the security community at some point in 2008 or thereabo...

UK network and ISP study reveals slow speeds and geographic variance

Posted: 09 Aug 2011 02:46 AM PDT

A study by Pando Networks revealed striking disparities between the theoretical and real-world download speeds for British broadband users. By tracking the end-user speeds for more than 400,000 use...

Protecting mobile phones? Most don't bother

Posted: 09 Aug 2011 02:34 AM PDT

Although almost a quarter of consumers (22%) have lost a mobile phone in the past, and a further 12% have had a phone stolen, 67% don't have passwords set up on their mobile phones to protect stored d...

TYPO3 multiple vulnerabilities

Posted: 08 Aug 2011 09:09 PM PDT

Multiple vulnerabilities have been reported in TYPO3, according to Secunia. These can be exploited by malicious users to bypass certain security restrictions, conduct script insertion attacks, disclos...

Thor’s Microsoft Security Bible

Posted: 08 Aug 2011 09:01 PM PDT

Thor's Microsoft Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The b...

0 comments:

Post a Comment