Apps on iOS 6 will require explicit permission to access personal data     |   
- Apps on iOS 6 will require explicit permission to access personal data
 - Democratic govts not immune to censorship attempts, says Google
 - The dangers of NOT passing cybersecurity legislation in 2012
 - Unpatched IE flaw actively exploited in the wild
 - Six arrested for peddling Android malware in Japan
 - Vulnerabilities in open source WAF ModSecurity
 - Increase in cyber threats and sabotage on critical infrastructure
 - US-CERT warns of Intel CPU flaw
 - Highest paying IT certifications
 - Real life examples on hackers bypassing CAPTCHA
 - Predicting Malicious Behavior
 - Week in review: Link between Flame and Stuxnet discovered, and cracking LinkedIn passwords
 
|    Apps on iOS 6 will require explicit permission to access personal data Posted: 18 Jun 2012 10:31 AM PDT Users of Apple devices equipped with the upcoming iOS version 6 will be explicitly warned when the app they are trying to install asks permission to access their contacts, calendars, reminders and the...    |   
|    Democratic govts not immune to censorship attempts, says Google Posted: 18 Jun 2012 08:36 AM PDT Judging by the numbers contained in Google's latest bi-annual Transparency Report, governments and government officials around the world have lately been approaching the Internet giant with content ta...    |   
|    The dangers of NOT passing cybersecurity legislation in 2012 Posted: 18 Jun 2012 07:15 AM PDT According to the U.S. Government, cyber-security protection of critical infrastructure is a national priority.  With 85 percent of the nation's critical infrastructure owned and operated by the privat...    |   
|    Unpatched IE flaw actively exploited in the wild Posted: 18 Jun 2012 07:10 AM PDT When Microsoft released a security advisory detailing a critical flaw in Microsoft XML Core Services and its corresponding "Fix it" mitigation solution last week, it made sure to note that it was awar...    |   
|    Six arrested for peddling Android malware in Japan Posted: 18 Jun 2012 05:11 AM PDT Six men - among which are three IT executives - have been arrested in Japan for having allegedly used Android malware to "earn" themselves over 20 million yen (around half a million US dollars) from u...    |   
|    Vulnerabilities in open source WAF ModSecurity Posted: 18 Jun 2012 05:00 AM PDT During our research of web application firewall evasion issues, we uncovered a flaw in ModSecurity that may lead to complete bypass of the installed rules, in the cases when ModSecurity is deployed to...    |   
|    Increase in cyber threats and sabotage on critical infrastructure Posted: 18 Jun 2012 04:50 AM PDT The Pacific Northwest National Laboratory (PNNL), in conjunction with McAfee, revealed a report that fully examines the current challenges facing critical infrastructure and key resources as well as i...    |   
|    US-CERT warns of Intel CPU flaw Posted: 18 Jun 2012 03:39 AM PDT A flaw in Intel chips leaves users of a number or x64-based operating systems vulnerable to system hijacking, the US Computer Emergency Readiness Team warns.         "Some 64-bit operating systems and vi...    |   
|    Highest paying IT certifications Posted: 18 Jun 2012 02:30 AM PDT ISACA's Certified Information Security Manager (CISM) and Certified in Risk and Information Systems Control (CRISC) credentials have been named two of the highest-paying IT certifications in the lates...    |   
|    Real life examples on hackers bypassing CAPTCHA Posted: 18 Jun 2012 12:18 AM PDT Computer-assisted tools and crowd sourcing can easily bypass traditional anti-spam solutions, forcing CAPTCHAs to evolve to address these techniques, according to Imperva.         A CAPTCHA, or a Complet...    |   
|      Posted: 17 Jun 2012 09:45 PM PDT Predicting Malicious Behavior combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more.         Writ...    |   
|    Week in review: Link between Flame and Stuxnet discovered, and cracking LinkedIn passwords Posted: 17 Jun 2012 09:00 PM PDT Here's an overview of some of last week's most interesting news, reviews and articles:         Lessons learned from cracking 2 million LinkedIn passwords   Like everyone this week, I learned about a huge ...    |   
| You are subscribed to email updates from Help Net Security - News   To stop receiving these emails, you may unsubscribe now.  |   Email delivery powered by Google | 
| Google Inc., 20 West Kinzie, Chicago IL USA 60610 | |
0 comments:
Post a Comment