Skype users targeted with calls spreading fake AV |
- Skype users targeted with calls spreading fake AV
- Bots troll hacker forums to discover data breaches
- iManager multiple vulnerabilities
- Cybercriminals find new ways to disguise spam
- Securing virtual environments and reducing malware risk
- Pay-per-install services attempt discreet comeback
- Con artists love social networks
- New versions of Trend Micro enterprise data protection software
- Smartphone and tablet security tips
- Data seepage from the corporate boundary
- Japanese defense contractor breached
- Event: Black Hat Abu Dhabi 2011
- Week in review: Windows 8 security features, the end of DigiNotar and BIOS rootkit in the wild
Skype users targeted with calls spreading fake AV Posted: 19 Sep 2011 10:25 AM PDT Showing considerable resourcefulness in their attempt to trick Internet users, fake AV peddlers have begun targeting Skype users with an unexpected call. "Attention: this is an automated computer s... |
Bots troll hacker forums to discover data breaches Posted: 19 Sep 2011 09:24 AM PDT When talking about bots, the first thing that comes to mind is often a bad one - i.e. how cyber crooks misuse the technology to bilk Internet users out of information or money. But, there is a firm ou... |
iManager multiple vulnerabilities Posted: 19 Sep 2011 08:16 AM PDT Gjoko Krstic has discovered multiple vulnerabilities in iManager, which can be exploited by malicious people to conduct cross-site scripting attacks, manipulate certain data, and disclose sensitive in... |
Cybercriminals find new ways to disguise spam Posted: 19 Sep 2011 07:59 AM PDT It used to be that malicious attachments came in emails with erotic photos of girls who "want to meet you", or "scandalous photos" of celebrities. Now, cybercriminals are disguising their messages to ... |
Securing virtual environments and reducing malware risk Posted: 19 Sep 2011 07:54 AM PDT Rapid7 announced that the new version of its vulnerability management solution, Nexpose 5.0, will address the complex security challenges presented by the wide scale adoption of virtualization technol... |
Pay-per-install services attempt discreet comeback Posted: 19 Sep 2011 07:20 AM PDT "Pay-per-install businesses can be temporarily compromised by welcome law enforcement action, but the crooks will always find a way to return," says McAfee's Francois Paget, who shared his recent disc... |
Con artists love social networks Posted: 19 Sep 2011 06:18 AM PDT Most social networks' users are hit by online scams almost daily - whether its the ubiquitous survey scam or the "share your cell phone number, get subscribed for a premium number service". These s... |
New versions of Trend Micro enterprise data protection software Posted: 19 Sep 2011 06:14 AM PDT Trend Micro now offers completely integrated data protection for messaging and collaboration systems providing many feature advantages for security professionals. ScanMail for Microsoft Exchange ... |
Smartphone and tablet security tips Posted: 19 Sep 2011 06:01 AM PDT ICSA Labs is offering a series of tips that businesses and consumers can use to protect themselves from security risks aimed at smartphones, tablets and apps. 1. Only buy apps from recognized app s... |
Data seepage from the corporate boundary Posted: 19 Sep 2011 05:00 AM PDT In a growing number of cases, Internet-facing business systems do not always reflect a well maintained, up-to-date security profile, and, as one would expect they are, by inference, vulnerable to expl... |
Japanese defense contractor breached Posted: 19 Sep 2011 04:48 AM PDT Mitsubishi Heavy Industries has revealed that its networks have been breached in what is considered the first cyber attack to hit Japan's defense industry. According to Reuters and Japanese newspap... |
Event: Black Hat Abu Dhabi 2011 Posted: 19 Sep 2011 03:54 AM PDT This year's Black Hat Abu Dhabi will bring the best in cyber security research and technical training to the middle East region; offering a deeper view into the increasingly complex threats presented ... |
Week in review: Windows 8 security features, the end of DigiNotar and BIOS rootkit in the wild Posted: 18 Sep 2011 09:01 PM PDT Here's an overview of some of last week's most interesting news: Linux Foundation suffers security breach A few weeks after the discovery of the compromise of the kernel.org website and several ... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment