Malicious MIDI files lead to rootkit malware |
- Malicious MIDI files lead to rootkit malware
- Web attacks peak at 38,000 an hour
- PoC exploits for Linux privilege escalation bug published
- User error is the biggest threat on the Internet
- Compromised Tumblr accounts sporting fake Starbucks gift cards
- Symantec advises customers to stop using pcAnywhere
- Protect your online image with tips from Microsoft
- Malicious QR codes and the persistence of rootkits
- Endpoint security through whitelisting
- Computer Security Fundamentals, 2nd Edition
- Organizations to replace BI functions with cloud offerings
- Event: OWASP AppSec Research 2012
Malicious MIDI files lead to rootkit malware Posted: 26 Jan 2012 07:41 AM PST A Windows Media remote code execution flaw that has been patched in the last Patch Tuesday is being exploited by attackers in the wild to deliver malware to the targets' computer, warns Trend Micro. ... |
Web attacks peak at 38,000 an hour Posted: 26 Jan 2012 05:49 AM PST Web applications are subject to business logic attacks, according to a report by Imperva. Imperva monitored and categorized attacks across the internet targeting 40 different applications. This all... |
PoC exploits for Linux privilege escalation bug published Posted: 26 Jan 2012 05:31 AM PST The publication of proof-of-concept exploit code for a recently spotted privilege escalation flaw (CVE-2012-0056 ) in the Linux kernel has left Linux vendors scrambling to push out a patch. The fla... |
User error is the biggest threat on the Internet Posted: 26 Jan 2012 04:38 AM PST Sophos unveiled a detailed assessment of the threat landscape - from hacktivism and online threats to mobile malware, cloud computing and social network security, as well as IT security trends for thi... |
Compromised Tumblr accounts sporting fake Starbucks gift cards Posted: 26 Jan 2012 03:49 AM PST It is a well known fact that compromised legitimate websites are often used by cyber crooks to drive traffic towards their scammy sites. The latest example of this practice can be found on a variet... |
Symantec advises customers to stop using pcAnywhere Posted: 26 Jan 2012 03:15 AM PST In a perhaps not wholly unexpected move, Symantec has advised the customers of its pcAnywhere remote control application to stop using it until patches for a slew of vulnerabilities are issued. Acc... |
Protect your online image with tips from Microsoft Posted: 26 Jan 2012 02:04 AM PST In observance of Data Privacy Day 2012, Microsoft is releasing new data about consumer behaviors online and is offering guidance and tips to help people better manage their online profiles and maintai... |
Malicious QR codes and the persistence of rootkits Posted: 26 Jan 2012 02:03 AM PST Cybercrime has come a long way since it was mostly a digital form of vandalism. It has developed into a criminal business operated for financial gain and is now worth billions. In a new report, AVG fo... |
Endpoint security through whitelisting Posted: 26 Jan 2012 12:09 AM PST The latest release of McAfee Application Control is integrated with McAfee Global Threat Intelligence to show the file reputation of every file in the enterprise. This feature coupled with whitelistin... |
Computer Security Fundamentals, 2nd Edition Posted: 25 Jan 2012 10:46 PM PST This book brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. It thoroughly covers core topics,... |
Organizations to replace BI functions with cloud offerings Posted: 25 Jan 2012 10:45 PM PST Nearly one third of organizations either already use or plan to use cloud or software-as-a-service (SaaS) offerings to augment their core business intelligence (BI) functions, according to Gartner. ... |
Event: OWASP AppSec Research 2012 Posted: 25 Jan 2012 10:27 PM PST OWASP AppSec Research is the European conference for anyone interested in application security. It's practically the OWASP AppSec Europe. Every two years we add "Research" in order to highlight tha... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment