"Google Pharmacy" spam hitting inboxes

"Google Pharmacy" spam hitting inboxes


"Google Pharmacy" spam hitting inboxes

Posted: 06 Mar 2012 09:13 AM PST

Google's name and reputation is once again being misused by spammers trying to trick users into believing that what they are selling is endorsed or approved by the Internet giant. In the last few d...

LulzSec leader Sabu helps police arrest Anonymous hackers

Posted: 06 Mar 2012 07:45 AM PST

Sabu, the apparent leader of the LulzSec hacktivist group, has been unmasked by the FBI last June and has since been working with them to secure evidence against the group's other members. Accordin...

New P2P botnet soon available for sale

Posted: 06 Mar 2012 06:47 AM PST

The development of a new botnet that will rely on a decentralized architecture based on P2P technology is nearing completion and will soon be offered for sale for a sum of $8000 on a number of undergr...

Flash vulnerability exploited to deliver malware

Posted: 06 Mar 2012 06:20 AM PST

Attackers are once again exploiting the public's tendency for not keeping its software updated and its ongoing interest about Iran and its nuclear program to infect users with a backdoor Trojan. Th...

IT security in 2020

Posted: 06 Mar 2012 06:00 AM PST

Predicting how the world will look like a hundred years from now might seem to many like an exercise in futility given the rapid pace of technological development, but a prediction of what kind of inf...

Removing risk from network and security change management

Posted: 06 Mar 2012 05:00 AM PST

"There is nothing wrong with change, if it's in the right direction," said Winston Churchill. But speak to a hard-pressed CSO or CIO, and they'll tell you that any type of change is a potential risk. ...

Big data solution for network traffic

Posted: 06 Mar 2012 03:10 AM PST

Bivio NetFalcon is the first big data solution for network traffic that performs real-time analytics on long-term, large scale records of network communications. Currently sold to and deployed by...

Major phishing contributors and enablers

Posted: 06 Mar 2012 02:31 AM PST

Agari announced the first Annual Sumo Awards to dishonor phishing's biggest contributors and enablers. The Sumo Awards categories identify why phish emails succeed, highlight unknowing contributors wh...

The decline of trust in social networking platforms

Posted: 06 Mar 2012 02:10 AM PST

The UK is increasingly well connected, however it is seeing a wave of distrust across all major communications channels (mobile, fixed and social networking) due to fears surrounding security threats ...

Network-wide anomaly detection and packet forensics

Posted: 06 Mar 2012 02:00 AM PST

Endace launched OSm 5.0, the latest software release for their range of accurate high speed network monitoring and recording systems. OSm 5.0 offers:Real time indexing of monitored packet flowsAp...

Most companies blame employees for data breaches

Posted: 06 Mar 2012 12:00 AM PST

Employee negligence or maliciousness is the root cause of many data breaches, according to the Ponemon Institute. Over 78 percent of respondents blame employee behaviors, both intentional and accid...

Windows file protection with instant recovery

Posted: 05 Mar 2012 10:15 PM PST

Condusiv Technologies launched Undelete 10, real time data protection and instant data recovery. The Server, Professional and Client editions of Undelete let you see the contents of Recovery Bins...

The CERT Guide to Insider Threats

Posted: 05 Mar 2012 09:03 PM PST

Since 2001, the CERT Insider Threat Center at Carnegie Mellon University's Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crime...

0 comments:

Post a Comment