Microsoft patches 20 vulnerabilities |
- Microsoft patches 20 vulnerabilities
- 12 hacking groups are behind most Chinese cyber attacks
- Nitro attackers still at it, mock Symantec
- The multiple dimensions of corporate espionage
- Sykipot Trojan takes advantage of Adobe Reader zero-day flaw
- Confidential data exposure in public spaces
- Top software failures of 2011
- Holiday travel is risky business for mobile devices
- iPad 2 and $1,000 gift cards offered by scammers
- Card info of 1m Restaurant Depot customers stolen in breach
- NETGEAR router with Mac features
- Managing firewalls in virtual environments
- The risks of unauthorized access
Microsoft patches 20 vulnerabilities Posted: 13 Dec 2011 12:22 PM PST For the December Patch Tuesday, Microsoft released thirteen security bulletins that fix vulnerabilities targeting Windows, Internet Explorer, and Office. Three are marked as critical and ten as import... |
12 hacking groups are behind most Chinese cyber attacks Posted: 13 Dec 2011 11:40 AM PST Eastern European and Russian hackers mostly steal financial information, while Chinese ones are mainly after intellectual propriety or other sensitive data, say security analysts and US officials, and... |
Nitro attackers still at it, mock Symantec Posted: 13 Dec 2011 10:26 AM PST Back at the beginning of November, Symantec researchers made public a report they compiled on a spear phishing campaign carrying a backdoor Trojan that was systematically targeting companies in the ch... |
The multiple dimensions of corporate espionage Posted: 13 Dec 2011 08:41 AM PST You've spent months fixing the red items on an internal audit report and just passed a regulatory exam. You've performed a network vulnerability assessment and network pen test within the last year an... |
Sykipot Trojan takes advantage of Adobe Reader zero-day flaw Posted: 13 Dec 2011 07:12 AM PST AlienVault Labs researchers have unearthed a piece of malware that takes advantage of the recently discovered zero-day Adobe Reader flaw used for attacking defense contractors. The malware in quest... |
Confidential data exposure in public spaces Posted: 13 Dec 2011 07:05 AM PST While protecting data on computers is top of mind for everyone, most organizations are focused on conventional security technologies such as anti-virus software, personal firewalls and spam filters, a... |
Posted: 13 Dec 2011 07:00 AM PST SQS Software Quality Systems compiled a list of the worst software failures of 2011 that have damaged reputations, impacted negatively on financials and caused stress to users. Phil Codd, Managing ... |
Holiday travel is risky business for mobile devices Posted: 13 Dec 2011 05:46 AM PST The holidays are a time for tropical getaways, traveling to Grandma's house to see family and friends and one of the likeliest times a person will lose their mobile device, according to AVG. Their ... |
iPad 2 and $1,000 gift cards offered by scammers Posted: 13 Dec 2011 05:38 AM PST Typosquatting is often-used tool by online scammers who try to take advantage of users looking for legitimate pages, and a recently spotted spam campaign is employing that technique to redirect users ... |
Card info of 1m Restaurant Depot customers stolen in breach Posted: 13 Dec 2011 05:11 AM PST Customers of US foodservice wholesaler Restaurant Depot and "cash and carry" chain Jetro have begun receiving letters warning them about the possibility of their credit card details having been stolen... |
NETGEAR router with Mac features Posted: 13 Dec 2011 05:09 AM PST NETGEAR announced Wireless Extreme for Mac and PC (WNDRMAC), the company's first home router to offer Mac-specific capabilities including native support for Apple's Time Machine back-up software and... |
Managing firewalls in virtual environments Posted: 13 Dec 2011 04:02 AM PST AlgoSec announced the ia solution for managing firewalls in virtual environments. AlgoSec Security Management Suite simplifies hypervisor-level firewall management by automating the analysis and ch... |
The risks of unauthorized access Posted: 13 Dec 2011 03:48 AM PST HP unveiled new global research that reports increased threats to sensitive and confidential workplace data are created by a lack of control and oversight of privileged users, including database admin... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment