Researchers demonstrate tragic state of SCADA security |
- Researchers demonstrate tragic state of SCADA security
- Online reputation manager suspected of Illegal code injection
- Secure collaboration for iPad and iPhone
- Advanced malware protection with Sourcefire FireAMP
- Tax-themed spam delivers malware
- DreamHost hacker accessed pool of unencrypted passwords
- Tool used in Anonymous Megaupload campaign
- New Infrastructure as a Service federation platform
- Low Tech Hacking
- Data Privacy Day 2012 is upon us
- Week in review: Zappos, Symantec breaches, identities of Koobface gang revealed, and Megaupload shutdown
Researchers demonstrate tragic state of SCADA security Posted: 23 Jan 2012 10:23 AM PST Since the discovery of Stuxnet, we've been hearing from a variety of researchers about security vulnerabilities in SCADA computer systems. While some researchers such as Luigi Auriemma occasionally sh... |
Online reputation manager suspected of Illegal code injection Posted: 23 Jan 2012 08:00 AM PST For individuals and companies that have a bad online reputation, online reputation management (ORM) services might sound like a good investment. Such services are not illegal, even though search engin... |
Secure collaboration for iPad and iPhone Posted: 23 Jan 2012 07:06 AM PST WatchDox, a provider of secure document access and collaboration solutions, today announced that its users can now securely view and make annotations to documents directly on their iOS devices, while ... |
Advanced malware protection with Sourcefire FireAMP Posted: 23 Jan 2012 07:00 AM PST Sourcefire introduced FireAMP advanced malware protection, a malware discovery and analysis solution that analyzes and blocks malware by utilizing big data analytics. Designed for large enterprises... |
Tax-themed spam delivers malware Posted: 23 Jan 2012 05:01 AM PST The US Internal Revenue Service kicked off the 2012 tax filing season on January 4, and malware peddlers haven't waited much to begin targeting users with tax-themed spam emails. Trend Micro recent... |
DreamHost hacker accessed pool of unencrypted passwords Posted: 23 Jan 2012 03:43 AM PST DreamHost, one of the world's most popular and well-known web hosting providers, has sent a warning out to its customers saying that one of their databases containing user FTP/shell access passwords h... |
Tool used in Anonymous Megaupload campaign Posted: 23 Jan 2012 02:18 AM PST Once again, Anonymous is using the low orbit ion canon (LOIC) to DDoS websites. This tool was developed by white hat hackers to stress test websites. Not surprisingly, the tool they are using is ex... |
New Infrastructure as a Service federation platform Posted: 23 Jan 2012 01:58 AM PST 6fusion released its next generation UC6 Infrastructure as a Service (IaaS) federation platform. The new version features a completely redesigned web user interface, along with an updated underly... |
Posted: 22 Jan 2012 10:18 PM PST Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for m... |
Data Privacy Day 2012 is upon us Posted: 22 Jan 2012 09:42 PM PST Coordinated and led by the National Cyber Security Alliance (NCSA), Data Privacy Day on January 28, 2012 will promote the importance of data privacy and encourage digital citizens to exercise closer c... |
Posted: 22 Jan 2012 09:00 PM PST Here's an overview of some of last week's most interesting news and podcasts: Google Docs hosted phishing schemes abound Sophos has recently spotted two distinct phishing campaigns - one targeti... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment