Premium rate phone firms heavily fined for typosquatting |
- Premium rate phone firms heavily fined for typosquatting
- Thwarting attacks with genetically-inspired computer configuration systems
- Social mobile apps found storing users' contacts without permission
- Apple preparing a safer version of OS X
- Why is residual risk so important?
- Malicious sites increase 240%
- Nessus 5.0 vulnerability scanner released
- Trend Micro secures PlayStation Vita gamers
- Web-based breach tool for healthcare IT
- Secure data with cloud-based encryption
- The Internet of Things: Key Applications and Protocols
Premium rate phone firms heavily fined for typosquatting Posted: 16 Feb 2012 09:25 AM PST PhonepayPlus, the regulatory body for all premium rate phone-paid services in the UK, has ordered two Amsterdam-based companies to pay a fine of 100,000 pounds each and to refund the users that they m... |
Thwarting attacks with genetically-inspired computer configuration systems Posted: 16 Feb 2012 08:19 AM PST In the seemingly unending search for computer security solutions that are both reactive and proactive, researchers have occasionally turned to other sciences for ideas. In creating an algorithm tha... |
Social mobile apps found storing users' contacts without permission Posted: 16 Feb 2012 06:04 AM PST A week ago, app developer Arun Thampi made public his discovery that Path - a popular iOS app that allows users to keep a journal of their everyday life and share it with others through a number of so... |
Apple preparing a safer version of OS X Posted: 16 Feb 2012 06:01 AM PST The next version of OS X called Mountain Lion will be available this summer. Among the many new features, it will come with Gatekeeper that will help prevent users from unknowingly downloading and ins... |
Why is residual risk so important? Posted: 16 Feb 2012 05:30 AM PST The term 'residual risk' is mandatory in the risk management process according to ISO 27001, but is unfortunately very often used without appreciating the real meaning of the concept. What is resid... |
Posted: 16 Feb 2012 04:35 AM PST In 2011, the most significant evolution in the threat landscape was the use of malware networks, or malnets, to launch highly dynamic Web-based attacks, according to Blue Coat Systems. These comp... |
Nessus 5.0 vulnerability scanner released Posted: 16 Feb 2012 01:09 AM PST Tenable Network Security announced Nessus 5.0, a vulnerability and configuration assessment solution for enterprises and security professionals. Nessus 5.0 delivers introduces enhancements that s... |
Trend Micro secures PlayStation Vita gamers Posted: 16 Feb 2012 01:06 AM PST Trend Micro extended its collaboration with Sony and is now offering two web security services - "Trend Micro Kids Safety" and "Trend Micro Web Security" - for the portable entertainment system PlaySt... |
Web-based breach tool for healthcare IT Posted: 16 Feb 2012 12:21 AM PST Healthcare has become one of the most-breached industries, placing hospitals, clinics and health plans under scrutiny of the Department of Health and Human Services (HHS) Office for Civil Rights (OCR)... |
Secure data with cloud-based encryption Posted: 15 Feb 2012 11:39 PM PST Porticor introduced its Virtual Private Data (Porticor VPD) system, a solution combining data encryption with patented key management to protect critical data in public, private and hybrid cloud envir... |
The Internet of Things: Key Applications and Protocols Posted: 15 Feb 2012 10:39 PM PST The Internet of Things describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and ETSI M2M. The authors d... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment