What threats can we expect in October? |
- What threats can we expect in October?
- How to conduct an internal audit according to ISO 27001 and BS 25999-2
- WineHQ database breached; Fedora Project forces password change
- Data security for businesses that don't need a full security suite
- Trojanized Netflix app steals account login credentials
- Security pros say that hackers have the upper hand
- Cyber threat defense, detection and response platform
- Website reputation and automatic blacklisting enhance GFI WebMonitor
- SANS London 2011 training
What threats can we expect in October? Posted: 13 Oct 2011 09:42 AM PDT Fraudulent online storefront promising cheap HP Touchpads, poisoned search engine results targeting users searching on Yahoo and Bing, and spam promising a US green card have targeted people during Se... |
How to conduct an internal audit according to ISO 27001 and BS 25999-2 Posted: 13 Oct 2011 08:10 AM PDT The key purpose of an internal audit is for an organization to find out if all the processes and activities are running as they are expected. An nternal audit is usually perceived as an overhead wi... |
WineHQ database breached; Fedora Project forces password change Posted: 13 Oct 2011 06:24 AM PDT Following last month's compromises of the primary repository for the Linux kernel source code and the websites and infrastructure of the Linux Foundation comes the news that another open source projec... |
Data security for businesses that don't need a full security suite Posted: 13 Oct 2011 05:14 AM PDT Protecting sensitive data is an irreplaceable part of computer security. Useful tools for data encryption and shredding belong to the standard gear of TrustPort Total Protection. For the needs of busi... |
Trojanized Netflix app steals account login credentials Posted: 13 Oct 2011 04:19 AM PDT When Netflix released an Android client app earlier this year, it also witnessed the attempts of various app developers who tried to make a pirated copy of it work on other devices and platforms. A... |
Security pros say that hackers have the upper hand Posted: 13 Oct 2011 03:25 AM PDT The numbers don't lie: now, more than ever, security professionals feel outgunned by attackers and the level of automation employed in most campaigns against enterprise IT infrastructure, according to... |
Cyber threat defense, detection and response platform Posted: 13 Oct 2011 02:59 AM PDT LogRhythm announced LogRhythm 6.0, an evolution to its SIEM 2.0 security intelligence platform with significant innovations in cyber threat defense, detection and response. The platform addresses ... |
Website reputation and automatic blacklisting enhance GFI WebMonitor Posted: 13 Oct 2011 02:29 AM PDT GFI announced that GFI WebMonitor now includes new security and anti-malware features that enable small and medium-sized businesses to provide employee Internet access without sacrificing network prot... |
Posted: 13 Oct 2011 02:00 AM PDT Andrew Smith is the Managing Director, EMEA, for the SANS Institute. In this interview he discusses the SANS London 2011 training event and offers insight into what exactly you can expect if you decid... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment