Flame abused Windows Update to spread |
- Flame abused Windows Update to spread
- Win8s AV will kick in after other solutions stop working
- Apple publishes iOS security guide
- UGNazi attack 4chan, CloudFlare
- Real-time mobile vulnerability management
- Over-55s pick stronger passwords than youngsters
- Passing the internal scan for PCI DSS 2.0
- Consumers confused about data breaches
- Some Flame modules were signed with rogue Microsoft certificates
- Siemens enhances security of industrial networks
- iOS app creates different personas on social networks
- Information Storage and Management
- Week in review: New cyber weapon Flame, gamers under attack, and the new issue of (IN)SECURE Magazine
Flame abused Windows Update to spread Posted: 04 Jun 2012 11:50 AM PDT You have probably already heard that Microsoft released an out-of-band update that revokes three rogue certificates that were used to sign a couple of modules of the recently discovered Flame (SkyWipe... |
Win8s AV will kick in after other solutions stop working Posted: 04 Jun 2012 10:29 AM PDT Last week, McAfee shared the findings of a year-long project that revealed that some 17 percent of all the tested PCs around the globe had either no AV software installed or they have and it's not act... |
Apple publishes iOS security guide Posted: 04 Jun 2012 08:05 AM PDT Apple has a reputation for being extremely reticent when it comes to discussing security in public - so much so that most of the security features their devices sport have been discovered by researche... |
UGNazi attack 4chan, CloudFlare Posted: 04 Jun 2012 06:29 AM PDT Visitors to 4chan have recently been automatically redirected to the Twitter account of hacker group UGNazi, and an investigation into the matter revealed that the attack has been executed through a c... |
Real-time mobile vulnerability management Posted: 04 Jun 2012 06:21 AM PDT Mobilisafe launched its cloud-based Mobile Risk Management (MRM) solution, enabling IT to identify and eliminate the significant risks associated with the Bring-Your-Own-Device (BYOD) trend. A 30-day ... |
Over-55s pick stronger passwords than youngsters Posted: 04 Jun 2012 05:05 AM PDT Despite the often repeated recommendations by security experts, most users regularly fail to choose strong enough passwords. Joseph Bonneau, a computer scientist and researcher at Cambridge Unive... |
Passing the internal scan for PCI DSS 2.0 Posted: 04 Jun 2012 05:00 AM PDT Merchants subject to Payment Card Industry Data Security Standard (PCI DSS) rules are often blindsided by DSS changes, arrival of new payment technologies, and newly emerging business context. In addi... |
Consumers confused about data breaches Posted: 04 Jun 2012 04:11 AM PDT A business's ability to protect personal information and communicate the circumstances of a data breach can impact customer loyalty and an organization's trustworthiness and reputation, according to a... |
Some Flame modules were signed with rogue Microsoft certificates Posted: 04 Jun 2012 03:34 AM PDT While investigating the recently unearthed Flame (SkyWiper) toolkit, Microsoft's researchers have made an unwelcome discovery. "We have discovered through our analysis that some components of the m... |
Siemens enhances security of industrial networks Posted: 03 Jun 2012 11:09 PM PDT Siemens announced new versions of its Simatic NET CP 343-1 Advanced and Simatic NET CP 443-1 components with integrated security functions to enable companies to enhance the security of their networks... |
iOS app creates different personas on social networks Posted: 03 Jun 2012 10:12 PM PDT Have you ever decided not to post an update because you didn't want your entire social network to be privy to every intimate detail of your life? Of course you have. That's why a new app is eliminatin... |
Information Storage and Management Posted: 03 Jun 2012 09:30 PM PDT Information Storage and Management covers the components of a storage system and the different storage system models while also offering essential new material that explores the advances in existing t... |
Posted: 03 Jun 2012 09:00 PM PDT Here's an overview of some of last week's most interesting news, podcasts, videos, interviews and articles: Privacy trends affecting security In this podcast recorded at the RSA Conference 2012,... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment