Anonymous leaks FBI conference call on hacking investigations |
- Anonymous leaks FBI conference call on hacking investigations
- Server-side polymorphic Android apps
- Attackers use fake friends to blend into Facebook
- Kelihos botnet rises up again
- Concerned about online privacy? FBI says you might be a terrorist
- Google reveals it is already scanning Android apps for malware
- VeriSign hack: Reactions from the security community
- The fusion of hardware encryption, PIN access and USB 3.0
- Netop updates remote support and management solution
- Privacy and Big Data
Anonymous leaks FBI conference call on hacking investigations Posted: 03 Feb 2012 09:28 AM PST Anonymous resumed today its F**k FBI Friday campaign by publishing a 16-minute-long mp3 recoding of a confidential conference call between representatives of both law enforcement agencies. The subjec... |
Server-side polymorphic Android apps Posted: 03 Feb 2012 07:18 AM PST Server-side polymorphism as a technique to serve unique malware versions that evade signature-based detection to Windows users is used by many malware peddlers on a regular basis, but Symantec resear... |
Attackers use fake friends to blend into Facebook Posted: 03 Feb 2012 06:32 AM PST A new Barracuda Labs study provides an example of an increasing number of attackers move to social networks to carry out their wares. The study analyzes a random sampling of 2,884 active Facebook a... |
Posted: 03 Feb 2012 06:13 AM PST Kelihos - the botnet whose operation was disrupted last September by Microsoft and Kaspersky Lab by shutting down its C&C servers and making its bots contact a sinkhole instead - is back and working. ... |
Concerned about online privacy? FBI says you might be a terrorist Posted: 03 Feb 2012 04:52 AM PST Being concerned about your online privacy might be a sign that you're up to no good, says the FBI and the US Department of Justice, via a collection of 25 fliers to be distributed to people working at... |
Google reveals it is already scanning Android apps for malware Posted: 03 Feb 2012 03:38 AM PST Even though most malicious Android apps are served from third-party app markets, cyber crooks occasionally manage to disseminate some via Google's official Android Market. Security experts have ... |
VeriSign hack: Reactions from the security community Posted: 03 Feb 2012 12:05 AM PST VeriSign admitted it was hacked in 2010 and cannot identify what data was stolen. Below are comments on the situation that Help Net Security received from industry veterans. Jon Callas, CTO for E... |
The fusion of hardware encryption, PIN access and USB 3.0 Posted: 02 Feb 2012 10:00 PM PST Apricorn expanded their Aegis Secure Drives to the desktop environment with a new desktop edition, the Aegis Padlock DT. Sporting a spacious capacity of up to 3 TB with a Super Speed USB 3.0 inte... |
Netop updates remote support and management solution Posted: 02 Feb 2012 09:30 PM PST Netop unveiled the latest version of its remote support product, Netop Remote Control 11. Now with a new secure tunnel option, customers can extend their support and management capabilities by re... |
Posted: 02 Feb 2012 09:00 PM PST Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and m... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment