Active fake AV spam campaigns hit Twitter |
- Active fake AV spam campaigns hit Twitter
- Bank accounts of 3 million Iranians compromised
- Apple enhances Apple ID account security
- Bogus "Account limit exceeded" emails targeting Yahoo users
- Use iPads and iPhones securely on the job
- Behind the scenes of the cleanest ISP in the world
- Scalable network encryption for the cloud
- Application control with Faronics Anti-Executable
- What is the top target of cyber attacks?
- Big data disruptions can be tamed
- Optimize Android for free with Bitdefender Power Tune-Up
Active fake AV spam campaigns hit Twitter Posted: 17 Apr 2012 10:57 AM PDT Two distinct malicious spam campaigns are currently targeting Twitter users and taking them to compromised sites serving rogue AV and scareware software, warns GFI. The messages are short ("a must ... |
Bank accounts of 3 million Iranians compromised Posted: 17 Apr 2012 10:19 AM PDT A former manager of an electronic banking clearance and automated payments system in Iran got tired of waiting for banks to fix a security vulnerability that put their customers in danger and brought ... |
Apple enhances Apple ID account security Posted: 17 Apr 2012 07:52 AM PDT iOS device owners whose Apple ID account may have triggered a flag with Apple's security team have been asked to set up three new security questions and a backup email address when they tried to downl... |
Bogus "Account limit exceeded" emails targeting Yahoo users Posted: 17 Apr 2012 07:02 AM PDT Fake Yahoo email notifications are hitting inboxes and urging users to verify their account because it has "exceeded its limit", Hoax-Slayer warns. The message is accompanied by a veiled threat of ... |
Use iPads and iPhones securely on the job Posted: 17 Apr 2012 07:01 AM PDT MokaFive, whose software is driving the use and acceptance of Macs in the enterprise, is now doing the same for the iPad and iPhone. The new MokaFive for iOS unites work and personal computing on iPad... |
Behind the scenes of the cleanest ISP in the world Posted: 17 Apr 2012 07:00 AM PDT The malware and botnet problem has been around for quite a while, and definitive solutions for it are still eluding the Internet and mobile communication industry, as well as the security industry. ... |
Scalable network encryption for the cloud Posted: 17 Apr 2012 06:44 AM PDT Certes Networks announced the vCEP (virtual Certes Enforcement Point), a scalable network encryption solution for the cloud. This virtual appliance allows organizations to protect network traffic a... |
Application control with Faronics Anti-Executable Posted: 17 Apr 2012 06:36 AM PDT Faronics released a new version of Faronics Anti-Executable, an application control tool that ensures endpoint security by only permitting approved executables to run on a workstation or server. Th... |
What is the top target of cyber attacks? Posted: 17 Apr 2012 05:20 AM PDT Customer, student, employee and patient information is most at risk for cyber attacks today, and defending that data is a top concern for IT professionals this year, according to a survey published by... |
Big data disruptions can be tamed Posted: 17 Apr 2012 04:39 AM PDT Enterprise architecture (EA) practitioners have a major role in ensuring their organizations maximize the business opportunities posed by big data, according to Gartner. Big data makes organizati... |
Optimize Android for free with Bitdefender Power Tune-Up Posted: 17 Apr 2012 04:33 AM PDT Bitdefender launched Power Tune-Up, a free app to maximize the performance of your Android while sparing battery power and controlling data traffic. "Bitdefender is strengthening its offering of ... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment