Fake Apple notifications lead to phishing site |
- Fake Apple notifications lead to phishing site
- Multitasking DevilRobber Trojan targets Mac OS X users
- Check Point extends 3D security with Dynasec acquisition
- Network and security analysis with Trisul
- eFront multiple vulnerabilities
- Irresponsible IT disposal methods
- A study of hacker forums
- ICSA Labs tests products against larger malware set
- How does GFI LanGuard help network administrators?
- Week in review: U.S. government satellites hacked, Halloween threats and the m00p gang investigation
Fake Apple notifications lead to phishing site Posted: 31 Oct 2011 09:09 AM PDT When changes are made to an Apple ID account, Apple sends a notification about it to the user so that he can react promptly if the changes weren't made by him. Unfortunately, cyber crooks are aware of... |
Multitasking DevilRobber Trojan targets Mac OS X users Posted: 31 Oct 2011 08:26 AM PDT Another week, another Mac OS X Trojan spotted. Both Sophos and Intego have detected a Bitcoin-mining Trojan that also opens a backdoor into the infected system and steals Bitcoins from the user's ... |
Check Point extends 3D security with Dynasec acquisition Posted: 31 Oct 2011 07:12 AM PDT Check Point announced the acquisition of privately held Dynasec, a provider of Governance, Risk Management and Compliance (GRC) solutions. The acquisition extends Check Point 3D Security that enables ... |
Network and security analysis with Trisul Posted: 31 Oct 2011 07:07 AM PDT Trisul is a new kind of network monitor that supplements fine grained traffic metering with flows, packets, and alerts. You can carry out any kind of network and security analysis. Trisul is desi... |
eFront multiple vulnerabilities Posted: 31 Oct 2011 06:42 AM PDT Multiple vulnerabilities have been reported in eFront, according to Secunia. These can be exploited by malicious users to conduct SQL injection attacks and compromise a vulnerable system and by malici... |
Irresponsible IT disposal methods Posted: 31 Oct 2011 06:30 AM PDT Although data security is the primary concern when decommissioning IT equipment, only 61 per cent of companies currently data wipe all of their redundant computers, according to research by Vanson Bou... |
Posted: 31 Oct 2011 06:25 AM PDT Recently Imperva released a report analyzing the content and activities of an online hacker forum with nearly 220,000 registered members. In this podcast, Rob Rachwald, the Director of Security Str... |
ICSA Labs tests products against larger malware set Posted: 31 Oct 2011 06:24 AM PDT ICSA Labs, an independent division of Verizon, is now testing products in its Anti-Virus program against virus samples from not only the WildList (a database of real-world viruses considered harmful t... |
How does GFI LanGuard help network administrators? Posted: 31 Oct 2011 04:15 AM PDT Managing an IT network that is continuously changing and growing is not a trivial task. Once the network comprises more than a handful of machines, it becomes a near-impossible task to monitor it manu... |
Week in review: U.S. government satellites hacked, Halloween threats and the m00p gang investigation Posted: 30 Oct 2011 09:01 PM PDT Here's an overview of some of last week's most interesting new, podcasts and articles: Microsoft puts vulnerability exploitation into context Recently Microsoft released the 11th volume of the M... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment