The use of exploit kits changed spam runs |
- The use of exploit kits changed spam runs
- DarkComet RAT used by wide array of attackers
- Instagram "Friendship Vulnerability" patched
- Nearly half a million Yahoo passwords leaked following hack
- GFI Software launches cloud security and networking platform
- Top skills for IT asset management leaders
- Major pitfalls involving vulnerability scanners
- Reverse Deception: Organized Cyber Threat Counter-Exploitation
The use of exploit kits changed spam runs Posted: 12 Jul 2012 10:01 AM PDT Spammers used to depend on email recipients to tie the noose around their own necks by inputing their personal and financial information in credible spoofs of legitimate websites, but with the advent ... |
DarkComet RAT used by wide array of attackers Posted: 12 Jul 2012 07:55 AM PDT Remote administration software such as the DarkComet RAT has many legal uses but it is unfortunately more known for being frequently misused by a wide array of cyber attackers. These illegal uses a... |
Instagram "Friendship Vulnerability" patched Posted: 12 Jul 2012 06:42 AM PDT A flaw in the popular Instagram app that allows potential snoopers to add themselves as friends of any Instagram user and, consequently, to access his or hers private information and photos has been d... |
Nearly half a million Yahoo passwords leaked following hack Posted: 12 Jul 2012 05:39 AM PDT Some 450,000 email addresses and associated unencrypted passwords have been dumped online by the hacking collective "D33Ds Company" following the compromise of a Yahoo subdomain. The attackers sa... |
GFI Software launches cloud security and networking platform Posted: 12 Jul 2012 04:22 AM PDT GFI Software announced GFI Cloud, a platform for the delivery of cloud services via a Web-based user interface, accessible from anywhere with an Internet connection. Initially, GFI Cloud will inc... |
Top skills for IT asset management leaders Posted: 12 Jul 2012 03:56 AM PDT The evolving and growing role of IT asset management (ITAM) is driving both increased demand for existing skills and a new requirement for augmented financial, commercial and legal skills, according t... |
Major pitfalls involving vulnerability scanners Posted: 12 Jul 2012 12:30 AM PDT While 92 percent of companies have a vulnerability management program in place, nearly half consider their networks to range from "somewhat" to "extremely" vulnerable to security threats, according to... |
Reverse Deception: Organized Cyber Threat Counter-Exploitation Posted: 11 Jul 2012 11:00 PM PDT Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify APTs, categorize them according to risk level, and prioritize your actions accordingly by applying expert, field... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment