Massive international identity theft operation shut down |
- Massive international identity theft operation shut down
- U.S. military drones hit by computer virus
- Virus Bulletin news tweets spread malware
- 163 new advanced evasion techniques discovered
- Android VPN client launches via fingerprint authentication
- Government telecommunication-spying malware opens backdoor
- Demystifying cloud computing security
- Most social networks users don't keep up with privacy settings changes
- Week in review: Patching strategies, HTC Android privacy flaw, and how well do you know SSL?
Massive international identity theft operation shut down Posted: 10 Oct 2011 10:05 AM PDT 111 individuals have been indicted in the largest identity theft takedown in U.S. history. The defendants, members of five organized forged credit card and identity theft rings based in Queens Cou... |
U.S. military drones hit by computer virus Posted: 10 Oct 2011 09:37 AM PDT An unnamed virus with a "keylogger" payload has been found in the computers used to operate U.S. Air Force's Predator and Reaper remotely operated drones. The discovery was made some two weeks ago,... |
Virus Bulletin news tweets spread malware Posted: 10 Oct 2011 08:15 AM PDT Malware peddlers are known for using news of unfolding events as lures to trick curious users into clicking on an offered malicious link. This practice is most often seen on Twitter, which is used by ... |
163 new advanced evasion techniques discovered Posted: 10 Oct 2011 07:38 AM PDT Stonesoft announced it has delivered 163 new advanced evasion technique (AET) samples for global vulnerability coordination. The new samples include AETs over a number of various protocols, including ... |
Android VPN client launches via fingerprint authentication Posted: 10 Oct 2011 06:44 AM PDT AuthenTec introduced a security solution that combines VPN client security with fingerprint recognition for Android smartphones and tablets. The QuickSec Mobile VPN Client 2.0 is a full-featured I... |
Government telecommunication-spying malware opens backdoor Posted: 10 Oct 2011 06:01 AM PDT The Chaos Computer Club claims that a government-made "lawful interception" Trojan has abilities that exceed those allowed by the nation's legislature and that those features can be easily misused by ... |
Demystifying cloud computing security Posted: 10 Oct 2011 06:00 AM PDT Phil Neray is the VP, Data Security Strategy, InfoSphere Guardium & Optim at IBM. In this interview Phil talks about the complex issues surrounding cloud computing security, offers insight into what c... |
Most social networks users don't keep up with privacy settings changes Posted: 10 Oct 2011 04:09 AM PDT The proliferation and usage of mobile devices is exponentially growing, as is consumers' dependence on the Web, causing many to lose sight of the importance of keeping their personal information and s... |
Week in review: Patching strategies, HTC Android privacy flaw, and how well do you know SSL? Posted: 09 Oct 2011 11:12 PM PDT Here's an overview of some of last week's most interesting news, videos, articles and podcasts: Serious disconnect between security perceptions and reality The majority of respondents (60 percen... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment