Kelihos, Waledac and Storm malware believed to have same author |
- Kelihos, Waledac and Storm malware believed to have same author
- eBay hacker receives 3-year suspended sentence
- Unique malware URLs increased 89 percent
- Five million new malware samples
- Carbonite privacy blunder results in spam
- First joint EU-US cyber security exercise
- Fake AV peddlers change their tactics
- Managing firewall risks in the cloud
- Registry Decoder: Digital registry forensics
- Norton updates Tablet Security and Mobile Security
Kelihos, Waledac and Storm malware believed to have same author Posted: 03 Nov 2011 10:00 AM PDT The recent takedown of the Kelihos botnet by Microsoft has received a lot of attention, despite the fact that the botnet is rather small (around 41,000 computers located worldwide). The reason behi... |
eBay hacker receives 3-year suspended sentence Posted: 03 Nov 2011 09:42 AM PDT The Romanian hacker who repeatedly hacked eBay servers, accessed parts of its sites that were off-limits to users and even accessed a number of eBay accounts has been handed down a three-year suspende... |
Unique malware URLs increased 89 percent Posted: 03 Nov 2011 07:46 AM PDT Websites loaded with malware increased a massive 89 percent in the third quarter compared to Q2 2011. According to an IID report, the most impersonated organizations include the FDIC, U.S. Federal Res... |
Five million new malware samples Posted: 03 Nov 2011 07:18 AM PDT In the third quarter of 2011 alone, five million new malware samples were created. In addition, Trojans set a record for becoming the preferred category for cybercriminals to carry out their informati... |
Carbonite privacy blunder results in spam Posted: 03 Nov 2011 07:04 AM PDT Popular online backup service Carbonite has made another privacy misstep. Computerworld blogger Richi Jennings, a self styled "anti-spam wonk", has discovered that the fact when he began receiving ... |
First joint EU-US cyber security exercise Posted: 03 Nov 2011 04:13 AM PDT The first joint cyber security exercise between the European Union and United States is being held today in Brussels, with the support of the EU's Network and Information Security Agency (ENISA) and t... |
Fake AV peddlers change their tactics Posted: 03 Nov 2011 04:06 AM PDT There has been a decline in rogue AV schemes lately, and researchers chalk it up to a combination of law enforcement and security community efforts and an increased coverage of the matter in main stre... |
Managing firewall risks in the cloud Posted: 02 Nov 2011 11:36 PM PDT 67 percent of IT security respondents in a Ponemon Institute study, report that their organization is very vulnerable or vulnerable because cloud ports and firewalls are not adequately secured. Fur... |
Registry Decoder: Digital registry forensics Posted: 02 Nov 2011 11:00 PM PDT Registry Decoder is a free and open source tool for the acquisition, analysis, and reporting of registry contents. It comes with an online acquisition component and an offline analysis component. |
Norton updates Tablet Security and Mobile Security Posted: 02 Nov 2011 10:00 PM PDT Symantec announced Norton Tablet Security and new updates for Norton Mobile Security, including a new "Scream" feature that helps users find a lost or stolen phone quickly. "With today's smartpho... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment