Counterclank: Info-stealing Trojan or advertising tool? |
- Counterclank: Info-stealing Trojan or advertising tool?
- Law firms get hacked for deal data
- Compromised WordPress sites lead to Phoenix exploit kit
- Greatest risks to database security
- The state of global cyber-readiness
- Identity and access management trends
- Apache Shiro: Java security framework
- The ABCs of security and compliance
- High-performance wireless APs from Aruba Networks
- The Web Application Hacker's Handbook, 2nd Edition
Counterclank: Info-stealing Trojan or advertising tool? Posted: 31 Jan 2012 11:20 AM PST A couple of days ago, Symantec has warned about Counterclank, an Android Trojan that has been unknowingly installed by users on over five million devices. This huge number was possible because the ... |
Law firms get hacked for deal data Posted: 31 Jan 2012 07:10 AM PST A successful cooperation between a law firm and its clients depends on the firm's ability of keeping the details of these relationships confidential - something that becomes harder and harder as cyber... |
Compromised WordPress sites lead to Phoenix exploit kit Posted: 31 Jan 2012 04:08 AM PST Several hundred compromised websites that at first glance don't appear to be malicious have been discovered by M86 researchers. The websites - mostly blogs and small, private pages - use Wordpress ... |
Greatest risks to database security Posted: 31 Jan 2012 03:27 AM PST The greatest challenge to database security may actually come from organizational issues, rather than nefarious or accidental acts, according to a survey presented by Application Security. In most ... |
The state of global cyber-readiness Posted: 31 Jan 2012 02:36 AM PST McAfee and the Security and Defence Agenda (SDA) revealed the findings from a report that paints a global snapshot of current thinking about the cyber-threat and the measures that should be taken to d... |
Identity and access management trends Posted: 31 Jan 2012 01:51 AM PST Six major trends will drive the evolution of corporate management of identity and access management (IAM) and privacy management in 2012, according to Gartner. "In 2012, businesses need to increa... |
Apache Shiro: Java security framework Posted: 31 Jan 2012 01:09 AM PST Apache Shiro is a Java security framework that performs authentication, authorization, cryptography, and session management. With Shiro's API, you can secure any application from the smallest mobile... |
The ABCs of security and compliance Posted: 31 Jan 2012 12:15 AM PST Understanding Security and Compliance is as easy as ABC: Access, Breaches and Changes. At a distance security and compliance share many similarities. As you get into the details, what you'll find is t... |
High-performance wireless APs from Aruba Networks Posted: 30 Jan 2012 11:09 PM PST Aruba Networks announced two additions to its portfolio of wireless access points. The Aruba Instant IAP-134 and IAP-135, both 900Mbps 802.11n access points, are designed for smaller offices and SMEs. |
The Web Application Hacker's Handbook, 2nd Edition Posted: 30 Jan 2012 10:06 PM PST Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This pra... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment