How much does a 0-day vulnerability cost? |
- How much does a 0-day vulnerability cost?
- Fake eBay identity confirmation message hitting inboxes
- Facebook users targeted with account-hijacking Chrome extensions
- Open source audit plug-in for MySQL
- New cloud disaster recovery service
- Android security from the ground up
- Exploiting legitimate online technology
- Data center industry dynamics
- Microsoft disrupts massive cybercrime operation
- Free online tool teaches IT security procedures
- Week in review: Facebook privacy loophole, Duqu still active, the world of vulnerability sellers
How much does a 0-day vulnerability cost? Posted: 26 Mar 2012 08:06 AM PDT The market for exploits for zero-day vulnerabilities has exploded in the last year, says Adriel Desautels, the founder of Netragard, a penetration testing and vulnerability assessment outfit that, amo... |
Fake eBay identity confirmation message hitting inboxes Posted: 26 Mar 2012 06:28 AM PDT Ebay users are once again targeted with fake notifications asking them to "confirm their identity". "Dear eBay Community Member, You're signing in from a computer we're not familiar with," says the... |
Facebook users targeted with account-hijacking Chrome extensions Posted: 26 Mar 2012 06:08 AM PDT With the steady rise in popularity of both Facebook and Google's Chrome browser, cyber scammers have turned to targeting users of both. According to Kaspersky Lab expert Fabio Assolini, Facebook us... |
Open source audit plug-in for MySQL Posted: 26 Mar 2012 05:58 AM PDT McAfee announced a free open source audit plug-in for MySQL database users to capture complete detailed activity audits from their databases. The plug-in was created and developed by McAfee as part... |
New cloud disaster recovery service Posted: 26 Mar 2012 05:44 AM PDT EVault announced a four-hour option for its Cloud Disaster Recovery Service (EVault CDR) with a guaranteed SLA. The EVault CDR four-hour managed service includes an SLA-backed guarantee for recover... |
Android security from the ground up Posted: 26 Mar 2012 05:00 AM PDT Georgia Weidman is a penetration tester, security researcher, and trainer. She's also one of the speakers at the upcoming HITBSecConf 2012 Amsterdam conference. In this interview she discusses the sec... |
Exploiting legitimate online technology Posted: 26 Mar 2012 03:23 AM PDT Criminals intent on distributing images of children being sexually abused are finding new ways of exploiting legitimate online technology, according to the Internet Watch Foundation (IWF). Criminal... |
Posted: 26 Mar 2012 02:00 AM PDT While interest around data center services (DCS) is extremely high, the market structure, dynamics and maturity differ across the world, according to Gartner. The shift toward industrialized services,... |
Microsoft disrupts massive cybercrime operation Posted: 26 Mar 2012 01:12 AM PDT In its most complex effort to disrupt botnets to date, Microsoft, in collaboration with the financial services industry including the Financial Services Information Sharing and Analysis Center (FS... |
Free online tool teaches IT security procedures Posted: 26 Mar 2012 12:59 AM PDT AVG Technologies launched SMB BootCamp, a free, online tool to help SMBs demonstrate to customers that their company is seriously committed to following AVG's recommended IT security procedures. Th... |
Week in review: Facebook privacy loophole, Duqu still active, the world of vulnerability sellers Posted: 26 Mar 2012 12:50 AM PDT Here's an overview of some of last week's most interesting news, podcasts, videos and articles: US govt and military email addresses offered for sale Webroot has recently unearthed an offer for ... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment