"Groupon discount gifts" email leads to malware |
- "Groupon discount gifts" email leads to malware
- Is Ubisoft's DRM browser plugin a rootkit?
- Researcher demonstrates highly persistent hardware backdoor
- Sophos releases free anti-virus app for Android
- Email from disgruntled buyer leads to eBay phishing page
- 1,500 severe security events detected on Black Hat WLAN
- Tumblr and Twitter users targeted with oddball spam messages
- Wargame examines the future of US infrastructure
- Five steps for a secure cloud transition
- Security storage app for iOS and Android devices
- The Computer Incident Response Planning Handbook
- Week in review: Hidden security risks of top mobile apps, Facebook invites white hats to attack its networks
"Groupon discount gifts" email leads to malware Posted: 30 Jul 2012 11:02 AM PDT Spam emails targeting users on the lookout for good deals have been hitting inboxes around the world, Sophos warns. The email purportedly comes from Groupon, the popular deal-of-the-day website, an... |
Is Ubisoft's DRM browser plugin a rootkit? Posted: 30 Jul 2012 09:50 AM PDT An offhand remark made by Google engineer Tavis Ormandy to a post on the Full Disclosure mailing list has sparked anger in the harts of Ubisoft users, as he shared his discovery of what seems to be a ... |
Researcher demonstrates highly persistent hardware backdoor Posted: 30 Jul 2012 08:36 AM PDT Spurred by the conclusion of a recent report that said that given the fact that China is the de-facto manufacturer of most IT equipment in the world, it could easily backdoor any computer well before ... |
Sophos releases free anti-virus app for Android Posted: 30 Jul 2012 07:40 AM PDT Sophos announced Sophos Mobile Security, a free lightweight anti-virus app that protects Android devices against malware, privacy issues and hardware loss - without reducing performance or battery lif... |
Email from disgruntled buyer leads to eBay phishing page Posted: 30 Jul 2012 05:46 AM PDT In these hard economic times, many have turned to eBay for selling things in order to earn a buck. But, in order to be trusted by buyers, the sellers depend on good ratings from those who have already... |
1,500 severe security events detected on Black Hat WLAN Posted: 30 Jul 2012 05:41 AM PDT The WLAN network at Black Hat was accessed by 3,155 attendees with a maximum of 904 simultaneous clients, detected and quickly contained a total of 1,561 severe independent security events. These e... |
Tumblr and Twitter users targeted with oddball spam messages Posted: 30 Jul 2012 05:21 AM PDT A bizarre spam campaign touting free McDonalds gift cards has recently been spotted on compromised Tumblr and Twitter accounts: According to GFI, the link included in the spam message first tak... |
Wargame examines the future of US infrastructure Posted: 30 Jul 2012 05:00 AM PDT Booz Allen Hamilton concluded the first-ever wargame simulation examining creative infrastructure initiatives and solutions that factor in US transportation needs by the year 2040. Simulation parti... |
Five steps for a secure cloud transition Posted: 30 Jul 2012 04:14 AM PDT Almost every type of SMB is examining its current IT infrastructure, determining what data and processes can move to the cloud. Of course, security remains one of the biggest concerns. Here are fiv... |
Security storage app for iOS and Android devices Posted: 30 Jul 2012 04:10 AM PDT TrustPort launched Portunes, a freeware security storage app that runs on iOS and Android devices. Portunes is an application protecting sensitive data like informationon user's credit cards, ban... |
The Computer Incident Response Planning Handbook Posted: 30 Jul 2012 12:27 AM PDT The Computer Incident Response Planning Handbook is derived from real-world incident response plans that work and have survived audits and repeated execution during data breaches and due diligence. ... |
Posted: 29 Jul 2012 09:00 PM PDT Here's an overview of some of last week's most interesting news, articles and reviews: Penetration testing tool masquerades as surge protector In the same way that a hardware keylogger may remai... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment