Walmart gift card scam targets smartphone users |
- Walmart gift card scam targets smartphone users
- Microsoft to release seven bulletins, three critical
- A new class of CISO is coming
- 1,000+ WordPress sites compromised through automatic update feature
- Microsoft names source of RDP code leak
- New hacking group hits government websites, leaks stolen data
- Top 10 business logic attack vectors
- Comprehensive email threat protection from GFI Software
- NetIQ minimizes the risk of unauthorized access
Walmart gift card scam targets smartphone users Posted: 04 May 2012 05:05 AM PDT Online survey scams are most often propagated through social network and sharing websites, but occasionally users are "assaulted" directly through their smartphones. Hoax-Slayer warns about a bogus... |
Microsoft to release seven bulletins, three critical Posted: 04 May 2012 05:04 AM PDT The Microsoft Security Bulletin Advance Notification for May 2012 contains 7 bulletins: three rated "critical" and the rest "important." Just when most organizations and consumers have been fanning th... |
Posted: 04 May 2012 04:05 AM PDT A new IBM study reveals a clear evolution in information security organizations and their leaders with 25 percent of security chiefs surveyed shifting from a technology focus to strategic business lea... |
1,000+ WordPress sites compromised through automatic update feature Posted: 04 May 2012 04:01 AM PDT More than 1,000 WordPress blogs have been modified to redirect visitors to sites serving malware, affiliate and pay-per-click redirectors, and low quality PPC search result aggregators, through the Wo... |
Microsoft names source of RDP code leak Posted: 04 May 2012 03:57 AM PDT Microsoft confirmed that, as speculated months ago, the RDP PoC exploit was sourced from China. It was apparent that the exploit originated in the West as researchers noticed that certain readable tex... |
New hacking group hits government websites, leaks stolen data Posted: 04 May 2012 02:37 AM PDT A hacker group that named itself "The Unknowns" has recently boasted on Pastebin of having compromised a number of government, business and educational websites, including ones belonging to the Europe... |
Top 10 business logic attack vectors Posted: 04 May 2012 12:00 AM PDT Application business logic flaws are unique to each custom application, potentially very damaging, and difficult to test. Attackers exploit business logic by using deductive reasoning to trick and ult... |
Comprehensive email threat protection from GFI Software Posted: 03 May 2012 10:27 PM PDT In order to help SMBs in the fight against email-borne threats, GFI Software today announced the availability of GFI MailEssentials 2012 UnifiedProtection. The solution features anti-spam functiona... |
NetIQ minimizes the risk of unauthorized access Posted: 03 May 2012 09:09 PM PDT Organizations struggle with managing and reporting on end user access and entitlements to meet monthly or quarterly reporting audit cycles and protect corporate information. Add an ever-increasing num... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment