The difficulties in sizing up botnets |
- The difficulties in sizing up botnets
- RedKit exploit kit spotted in the wild
- "Free additional storage" phishing emails doing rounds
- Android drive-by download malware served by hacked websites
- Location-based apps thrive despite privacy concerns
- Autorun-based threats account for 12% of global infections
- ISO 27001 benefits: How to obtain management support
- 50% of businesses feel the cloud is too risky
- Child ID theft epidemic continues to spread
- Users feel insecure on social media sites
- Audited way to reset or unlock domain account passwords
- Identity as a Service platform for cloud service providers
The difficulties in sizing up botnets Posted: 03 May 2012 11:51 AM PDT The main metric with which security researchers identify how effective and disruptive specific botnets are is the number of computers they consists of. Estimating their size allows them to asses... |
RedKit exploit kit spotted in the wild Posted: 03 May 2012 09:57 AM PDT A new exploit kit that Trustwave researchers have spotted being used in the wild is aiming to enter a market that is practically monopolized by the widely famous BlackHole and Phoenix exploit kits. ... |
"Free additional storage" phishing emails doing rounds Posted: 03 May 2012 05:05 AM PDT Symantec researchers warn about a variety of fake emails supposedly coming from popular email and online storage services, offering "storage quota upgrades". A click on the offered link takes the p... |
Android drive-by download malware served by hacked websites Posted: 03 May 2012 04:11 AM PDT A number of legitimate but compromised websites have been spotted serving Android malware to unsuspecting visitors, warns Lookout. The downloading of the malware, which poses as a system update,... |
Location-based apps thrive despite privacy concerns Posted: 03 May 2012 02:00 AM PDT Fifty-eight percent of consumers who have a smart device use location-based applications, despite concerns about safety and third-party use of their personal information for marketing purposes, accord... |
Autorun-based threats account for 12% of global infections Posted: 03 May 2012 01:48 AM PDT Bitdefender announced that more than four years after Autorun was eliminated from operating systems, worms that take advantage of the antiquated feature account for more than one of every ten computer... |
ISO 27001 benefits: How to obtain management support Posted: 03 May 2012 01:21 AM PDT As with any other project, if you do not ensure enough money and human resources, your ISO 27001 project will fail. Therefore, the only way to get those is to get your management buy-in. If you w... |
50% of businesses feel the cloud is too risky Posted: 03 May 2012 12:30 AM PDT Despite the apparent enthusiasm around cloud computing, a Wisegate survey revealed that over 50% believe the cloud is too risky for prime time, and only suitable for commodity applications like CRM or... |
Child ID theft epidemic continues to spread Posted: 02 May 2012 11:30 PM PDT The epidemic of child identity theft revealed last year is continuing to grow. 10.7% of the nearly 27,000 children in the study are victims of identity theft, 35 times higher than adults in the same p... |
Users feel insecure on social media sites Posted: 02 May 2012 10:03 PM PDT More than four out of five users worry about their personal information being stolen or misused on social media sites such as Facebook, Google+ and Twitter, according to Avira. The survey revealed tha... |
Audited way to reset or unlock domain account passwords Posted: 02 May 2012 09:36 PM PDT Lieberman Software released Account Reset Console 6.0, which permits delegated users to reset their own passwords and unlock their own accounts without involving IT staff, helping organizations mainta... |
Identity as a Service platform for cloud service providers Posted: 02 May 2012 09:01 PM PDT Symplified announced Symplified Structure which enables telcos, cloud service providers, cloud application brokers, and cloud application hosting companies to seamlessly integrate identity and access ... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment