Scammers demand $143 from Windows users, threaten with file deletion |
- Scammers demand $143 from Windows users, threaten with file deletion
- iPhone 5 "test and keep" spam campaign
- DigiNotar hacker shares details on GlobalSign breach
- Cybercriminals impersonating government agencies
- Drupal Author Pane module security bypass weakness
- How to deal with Internet security threats
- Mobile malware criminal command-and-control activity
- Identity theft protection tips for students
- Photos: The look and feel of SecurityByte 2011
- Network encryption starter kit
- Protect data on shared information networks
Scammers demand $143 from Windows users, threaten with file deletion Posted: 08 Sep 2011 06:04 AM PDT German Windows users are the latest target of some pretty brazen scammers, warns Panda Security. The whole thing starts with a Trojan - likely received via spammy emails or P2P networks - which get... |
iPhone 5 "test and keep" spam campaign Posted: 08 Sep 2011 05:40 AM PDT As the predictions about the release of iPhone 5 seem all to point to the beginning of October, cyber scammers have decided to add to the frenzy by offering the coveted device in exchange for "testing... |
DigiNotar hacker shares details on GlobalSign breach Posted: 08 Sep 2011 04:52 AM PDT Yesterday, GlobalSign announced that it will not be issuing any more certificates until the claims about a breach into its networks made by the "Comodo Hacker" are proved or disproved. Apart from m... |
Cybercriminals impersonating government agencies Posted: 08 Sep 2011 03:59 AM PDT GFI Software today announced its top 10 most prevalent threat detections for August 2011. Notable threats last month included spam and poisoned search engine results targeting fans of Harry Potter, Tr... |
Drupal Author Pane module security bypass weakness Posted: 08 Sep 2011 03:54 AM PDT A weakness has been reported in the Author Pane module for Drupal, which can be exploited by malicious people to bypass certain security restrictions, according to Secunia. The weakness is caused... |
How to deal with Internet security threats Posted: 08 Sep 2011 03:42 AM PDT How to use the Internet while staying secure has always been a concern for businesses. Over the last couple of years there have been many changes in the Internet threat scenario. Most notably there... |
Mobile malware criminal command-and-control activity Posted: 08 Sep 2011 02:53 AM PDT Criminal operators continue to hone their craft in 2011 using crimeware that can be repurposed for multiple fraud opportunities, sold or leased to other criminals, and that is now successfully infiltr... |
Identity theft protection tips for students Posted: 08 Sep 2011 01:56 AM PDT College students are especially attractive targets for identity thieves because they have unblemished credit records, making it easier for thieves to take out loans in their name. Additionally, man... |
Photos: The look and feel of SecurityByte 2011 Posted: 07 Sep 2011 11:04 PM PDT Help Net Security attended this India's largest information security conference in Bangalore - SecurityByte 2011. The opening ceremony with conference founder Nishchal Bhalla, His Excellency Shri... |
Network encryption starter kit Posted: 07 Sep 2011 10:00 PM PDT Certes Networks announced a Network Encryption Starter Kit which enables organizations to experience the full benefits of multi-layer encryption. "Many enterprises and government organizations allo... |
Protect data on shared information networks Posted: 07 Sep 2011 09:01 PM PDT Unisys announced its Stealth Solution for Secure Virtual Terminal (SSVT), a secure solution residing on a federal government-certified USB device to help ensure that a mobile user's data is secure and... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment