Trojan masquerading as PDF signed with stolen government certificate |
- Trojan masquerading as PDF signed with stolen government certificate
- Mass manipulation through automated social engineering
- Cyber crooks should get tougher sentences, says PCeU chief
- Study of next-generation firewall deployments
- Joomla! security bypass weakness and XSS vulnerability
- Security threats to expand in 2012
- Top five tips to avoid bad apps
- Apple OS X sandbox hole allows bypassing of restrictions
- Hacked Sky News Twitter account falsely reports on Murdoch arrest
- IBM unveils mobile security service
- Week in review: Cell phone money laundering, hardware Trojans and iOS flaw that allows downloading of malicious code
Trojan masquerading as PDF signed with stolen government certificate Posted: 14 Nov 2011 10:52 AM PST Since the discovery of the Stuxnet worm, and especially after the recent string of certification authority compromises, cyber attackers' practice of using digital certificates to sign malware and impe... |
Mass manipulation through automated social engineering Posted: 14 Nov 2011 09:19 AM PST In the past few years, social engineering has become cyber attackers' preferred method for gaining access to target systems, and it usually takes the form of a spoofed email or message booby-trapped w... |
Cyber crooks should get tougher sentences, says PCeU chief Posted: 14 Nov 2011 08:54 AM PST Cyber fraudsters and robbers often receive considerably lighter sentences that their real-world counterparts, says Detective Superintendent Charlie McMurdie, the head of UK's Police Central e-crime Un... |
Study of next-generation firewall deployments Posted: 14 Nov 2011 06:35 AM PST The results of a Ponemon Institute survey show 55 percent of users globally, and 64 percent in the U.S., are leveraging next-generation firewalls to augment their current security deployments, rather ... |
Joomla! security bypass weakness and XSS vulnerability Posted: 14 Nov 2011 06:25 AM PST A weakness and a vulnerability have been reported in Joomla!, which can be exploited by malicious people to bypass certain security restrictions and conduct cross-site scripting attacks, according to ... |
Security threats to expand in 2012 Posted: 14 Nov 2011 05:56 AM PST Attackers are sidestepping automated security technology and are using social engineering and data mining to orchestrate attacks against prominent individuals and their corporate networks, according t... |
Top five tips to avoid bad apps Posted: 14 Nov 2011 05:41 AM PST While reported mobile malware incidents are still relatively low in number, McAfee Labs is seeing significant growth in the mobile malware threat landscape. Due to the fact that smartphones and tab... |
Apple OS X sandbox hole allows bypassing of restrictions Posted: 14 Nov 2011 05:25 AM PST Following Apple's announcement that all applications submitted for inclusion in the App Store will have to have sandboxing implemented starting from March 1, 2012, researchers from Core Labs, the rese... |
Hacked Sky News Twitter account falsely reports on Murdoch arrest Posted: 14 Nov 2011 04:02 AM PST Hacking Twitter feeds of popular mainstream media outlets is a perfect way of getting your message across to or create panic among a great number of people. It has also lately been used by hacker grou... |
IBM unveils mobile security service Posted: 13 Nov 2011 11:15 PM PST IBM unveiled its Hosted Mobile Device Security Management service that helps organizations protect against data loss and other risks caused by device theft, unauthorized access, malware, spyware, and ... |
Posted: 13 Nov 2011 09:01 PM PST Here's an overview of some of last week's most interesting news and articles: Browser bloat and privacy concerns An increase in browser-based bloat and malware, and growing concern over online t... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment