Flashback botmasters earned less than $15K |
- Flashback botmasters earned less than $15K
- Anti-Anonymous hacker takes credit for The Pirate Bay DDoS
- Briton jailed for hacking a Facebook account
- SSL governance and implementation across the Internet
- Most CCTV systems are easily accessible to attackers
- How executives understand and manage IT risks
- A marathon of holiday spam
- Leveraging PCI standards to accept mobile payments securely
- Content-related threats cause significant data loss
- Android security: Protection of Java and native apps
- Cloud computing as key to improved data protection
Flashback botmasters earned less than $15K Posted: 17 May 2012 10:04 AM PDT It has already been established that the criminals behind the Flashback botnet were after money, but according to Symantec researchers, their plan was foiled by the attention that the first massive Ma... |
Anti-Anonymous hacker takes credit for The Pirate Bay DDoS Posted: 17 May 2012 08:43 AM PDT After 72 hours of being hit with an extensive DDoS attack and having been intermittently inaccessible to its visitors, The Pirate Bay and WikiLeaks are back online. It was initially thought that An... |
Briton jailed for hacking a Facebook account Posted: 17 May 2012 08:07 AM PDT Gareth Crosskey, a 21-year-old from West Sussex who was arrested for hacking into a private Facebook account, has been handed down a prison sentence of 12 months by the Southwark Crown Court on Wednes... |
SSL governance and implementation across the Internet Posted: 17 May 2012 07:49 AM PDT Philippe Courtot, Chairman and CEO at Qualys, talks about how the Trustworthy Internet Movement (TIM) has chosen SSL governance and implementation across the Internet as its first project. The nonp... |
Most CCTV systems are easily accessible to attackers Posted: 17 May 2012 03:30 AM PDT The use of CCTV cameras for physical surveillance of all kinds of environments has become so pervasive that most of us don't give the devices a second thought anymore. But, those individuals and ... |
How executives understand and manage IT risks Posted: 17 May 2012 01:54 AM PDT Corporate boards and executives are taking risk management seriously but there is still a gap in understanding the link between IT risks and enterprise risk management, according to a Carnegie Mellon ... |
Posted: 17 May 2012 01:01 AM PDT The main spam topics that emerged during the last quarter included the increase in spam during the holidays, mass mailings, malicious attachments and the distribution of phishing attacks, according to... |
Leveraging PCI standards to accept mobile payments securely Posted: 17 May 2012 12:03 AM PDT The PCI Security Standards Council (PCI SSC) published a customized fact sheet outlining how merchants can securely accept payments using mobile devices such as smartphones or tablets. The fact she... |
Content-related threats cause significant data loss Posted: 16 May 2012 11:00 PM PDT Content-layer threats those where an attacker leverages malicious software in what the user believes is harmless content are posing increasing risks for enterprise data loss according to new resea... |
Android security: Protection of Java and native apps Posted: 16 May 2012 09:45 PM PDT Arxan Technologies enhanced its Mobile Application Protection Suite to include multi-layered, end-to-end protection for Android applications. Given the open source nature of Android, Google recom... |
Cloud computing as key to improved data protection Posted: 16 May 2012 09:01 PM PDT More than half (55%) of U.S. organizations expect their use of the cloud to increase as part of their business continuity strategy over the next year, according to CA. Canadian organizations are st... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment