Symantec admits its networks were hacked and source code stolen

Symantec admits its networks were hacked and source code stolen


Symantec admits its networks were hacked and source code stolen

Posted: 18 Jan 2012 08:46 AM PST

After having first claimed that the source code leaked by Indian hacking group Dharmaraja was not stolen through a breach of its networks, but possibly by compromising the networks of a third party en...

Oracle patches 78 vulnerabilities

Posted: 18 Jan 2012 08:36 AM PST

Oracle publishes Critical Patch Updates (CPUs) on a quarterly schedule. Oracle released its January edition with patches for a majority of their product line:Oracle Solaris: eight vulnerabilities...

Trojan steals e-cash vouchers from Facebook users

Posted: 18 Jan 2012 07:58 AM PST

Recently, Trusteer came across a new configuration of the Carberp Trojan that targets Facebook users to commit financial fraud. Unlike previous Facebook attacks designed to steal user credentials f...

Global view into application usage

Posted: 18 Jan 2012 07:46 AM PST

New research published by Palo Alto Networks indicates explosive growth in global social networking and browser-based file sharing on corporate networks, with a 300 percent increase in active social n...

Entrust Discovery now offers Microsoft CAPI query capabilities

Posted: 18 Jan 2012 07:34 AM PST

Entrust expands its certificate discovery solution, Entrust Discovery, by broadening search capabilities for digital certificates residing within Microsoft's Cryptographic APIs (CAPI). And now with mo...

Bogus Western Union notice leads to phishing

Posted: 18 Jan 2012 06:44 AM PST

A fake Western Union notice is hitting inboxes around the world and scaring people into following the offered link to a phishing page. "Failure in updating your profile will result in limiting your...

Questioning of incoming data crucial for security awareness

Posted: 18 Jan 2012 06:03 AM PST

In the last six-to-twelve months, we have witnessed many different cyber attacks. Hacktivists were making a statement, the players behind the so-called Advanced Persistent Threats were often searching...

Google tests QR code-based authentication

Posted: 18 Jan 2012 04:06 AM PST

Google has apparently been testing an alternative to its two-step verification option for accessing Gmail and Google accounts, and it uses a QR code. The option is thought to have been devised for ...

D-Link introduces Layer 2+ managed stackable switch family

Posted: 18 Jan 2012 03:33 AM PST

D-Link expanded its portfolio of switching solutions with the D-Link DGS-3420 xStack series with Layer 2+ features. As the newest series in D-Link's switch portfolio, the D-Link DGS-3420, along wit...

Facebook "Free Mobile Recharge" scam hijacks accounts

Posted: 18 Jan 2012 03:15 AM PST

A phishing and survey scam rolled into one is currently targeting Facebook users and ends up hijacking their accounts and making it difficult for users to get them back, warns a McAfee researcher. ...

iPhone: The Missing Manual

Posted: 18 Jan 2012 02:24 AM PST

With the iOS5 software and the new iPhone 4S device, Apple has another world-class hit on its hands. This pocket computer comes with everything—cellphone, iPod, Internet, camcorder—except a print...

HiDrive Free: New cloud service

Posted: 18 Jan 2012 01:22 AM PST

HiDrive Free, a cloud-based service from STRATO, launched in the U.S. offering users 5GB of free online storage. With HiDrive Free, users can back up their data at a central location, as well as acces...

0 comments:

Post a Comment