Trojan hijacks often-used DLL file for stealthier approach |
- Trojan hijacks often-used DLL file for stealthier approach
- Indian govt to ask Yahoo, Google to route emails through servers in India
- New Zeus/SpyEye makes bots function as C&C servers
- Users don't bother changing default passwords
- ISO 27001 and BS 25999-2: Why is it better to implement them together?
- Security toolkit for online mobile applications
- Akamai protects enterprises from DDoS and application security attacks
- Novell integrates Mac device management
- Security platform uses virtual machine introspection
Trojan hijacks often-used DLL file for stealthier approach Posted: 22 Feb 2012 10:44 AM PST A new dropper Trojan has been detected by BitDefender researchers, and this one utilizes an interesting technique in order to hide from antivirus software installed on the compromised computer. Ins... |
Indian govt to ask Yahoo, Google to route emails through servers in India Posted: 22 Feb 2012 10:18 AM PST Web mail service providers such as Google, Yahoo, and others will be asked to route all emails accessed in India through servers located in the country - even if the mail accounts that receive and sen... |
New Zeus/SpyEye makes bots function as C&C servers Posted: 22 Feb 2012 05:50 AM PST The latest build of the Zeus/SpyEye malware shows a change that could very well hamper the security researchers' ability to take down the botnets using it and to find out the criminals behind them. ... |
Users don't bother changing default passwords Posted: 22 Feb 2012 03:30 AM PST Most people working with sensitive information want stricter security policies but rarely bother changing default, automatically generated and assigned passwords. To collect the responses, ElcomS... |
ISO 27001 and BS 25999-2: Why is it better to implement them together? Posted: 22 Feb 2012 02:21 AM PST Lots of companies implementing ISO 27001 struggle how to implement the requirements from Annex A.14 Business continuity management. The problem is that ISO 27001 does require such a control, but it ... |
Security toolkit for online mobile applications Posted: 22 Feb 2012 02:00 AM PST KOBIL Systems introduced mIDentity App Security Toolkit, which protects mobile users from security attacks. KOBIL offers two reference implementations of this toolkit: mIDentity Trusted Web View, a... |
Akamai protects enterprises from DDoS and application security attacks Posted: 22 Feb 2012 01:30 AM PST Akamai Technologies introduced Akamai Kona Site Defender, a service designed to protect the brand value of companies by shielding their web sites, applications and associated data in the face of attac... |
Novell integrates Mac device management Posted: 21 Feb 2012 11:45 PM PST Novell announced the availability ZENworks 11 Support Pack 2 which includes integrated device management for Mac, and introduces a new product offering with ZENworks Full Disk Encryption (FDE) and two... |
Security platform uses virtual machine introspection Posted: 21 Feb 2012 11:30 PM PST CounterTack announced three new solutions available on Event Horizon, a security platform utilizing virtual machine introspection (VMI), to help organizations identify, disrupt and respond to advanced... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment