Carberp gang arrested in Russia |
- Carberp gang arrested in Russia
- Computer and biological viruses might eventually converge
- Beware of fake Google AV
- Facebook privacy loophole allows regular spying on users
- Smartphone security checklist
- Confidential documents are leaving the workplace
- Cisco goes beyond BYOD
- Phishers trick gamers with adult cam show offer
- Protect data and automate log management
- VolP: The new way in?
- On-demand cloud identity management
- BS 25999-2: An overview of BCM implementation process
- The practice of insecure collaboration
Carberp gang arrested in Russia Posted: 20 Mar 2012 11:11 AM PDT Eight men have been arrested in Moscow for having allegedly stolen over $2 million from the bank accounts of over 90 Russian individuals by infecting their computers with the Carberp Trojan and other ... |
Computer and biological viruses might eventually converge Posted: 20 Mar 2012 10:05 AM PDT The term "computer virus" was coined by Fred Cohen in the early 1980s, because like its biological counterparts, the computer virus is essentially a sequence of information that codes its behavior in ... |
Posted: 20 Mar 2012 06:32 AM PDT Cyber crooks are once again trying to take advantage of Google's name and logo to push malware onto unsuspecting users. According to GFI researchers, a number of pages offering "Google antivirus" s... |
Facebook privacy loophole allows regular spying on users Posted: 20 Mar 2012 06:10 AM PDT With over 845 million active users, Facebook is a great source of willingly shared information for anyone who can effectively become a "Facebook friend" with the targets. And according to a pair of... |
Posted: 20 Mar 2012 06:07 AM PDT While smartphones can make a significant and positive impact on those who embrace the technology, conversely the technology can wreak havoc on its users if they are complacent, careless or re-active t... |
Confidential documents are leaving the workplace Posted: 20 Mar 2012 06:02 AM PDT 90% of Americans believe people remove confidential documents from the workplace, even though most adults (79%) say taking confidential files outside the office is grounds for termination. The File... |
Posted: 20 Mar 2012 05:57 AM PDT Employees are demanding not only to use their own devices at work, but also to have more flexibility in the way they work and when and where they work. The Cisco Connected World Technology Report f... |
Phishers trick gamers with adult cam show offer Posted: 20 Mar 2012 04:27 AM PDT A rather clever phishing scheme targeting Italian gamers has recently been spotted by Symantec researchers. The scammy page, hosted on a free web hosting site, was made to look like a popular gamin... |
Protect data and automate log management Posted: 20 Mar 2012 04:26 AM PDT Released today, WhatsUp Log Management 10.1.1 boasts pre-built, out-of-the-box reports, focused on complying with European-specific data protection regulations. The reports ease key compliance re... |
Posted: 20 Mar 2012 03:30 AM PDT Voice is now data and as such it is a new attack vector for hackers into a company network. Most VoIP systems being deployed are based on Session Initiation Protocol (or SIP) which was designed in the... |
On-demand cloud identity management Posted: 20 Mar 2012 03:22 AM PDT Ping Identity unveiled PingOne, a multiplexed identity switch in the cloud. One connection to PingOne provides businesses the convenience of Tier 1 Single Sign-On (SSO) access to all of their cloud ap... |
BS 25999-2: An overview of BCM implementation process Posted: 20 Mar 2012 02:38 AM PDT While many business continuity methodologies exist for more than 20 years, none of them have really managed to include business continuity in regular management duties this is probably why BS 25999-... |
The practice of insecure collaboration Posted: 19 Mar 2012 11:54 PM PDT Most often sensitive information exchanged beyond the firewall with business partners and customers is still primarily conducted through email and consumer-grade file sharing tools such as FTP sites, ... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment