Israeli websites attacked / Excel still vulnerable / Two-factor under attack
IBM sued over hacked email serverA Washington D.C. lawfirm has sued IBM claiming that an IBM employed was behind an attack on the lawfirm's email server. - CIO Magazine
Veterans Affairs faulted in data theft
A report from the inspector general points to a series of missteps within the Department of Veterans Affairs that led to the theft of data. - CNET News.com
Adobe fixes PDF Reader flaws
Adobe has patched two security flaws in its Adobe Acrobat and Reader software. - CNET News.com
"Putin death" trojan unleashed
A new trojan spreading through email attempts to lure users with a fake news story about the death of russian president Vladimir Putin. - Computer Weekly
Seven keys for complete message security
It is not easy to implement encryption of all messages in a corporation, without doing some forethought. - Computerworld
Microsoft research automates hunt for search engine spam
Microsoft is readying its Strider software tool to help combat spamming of search engines and weblogs. - eWEEK
Critical Excel flaws remain unpatched
Security researchers warn that even after Microsofts patches for its Office suite earlier this week, at least two critical flaws remain unpatched in Excel. - eWEEK
A year later, still no DHS cybersecurity chief
The position as cybersecurity chief at the U.S. Department of Homeland Security is still vacant after a year. - Federal Computer Week
Army close to full PKI implementation
The U.S. Army is close to completing its implementation of a public key encryption infrastructure. - Government Computer News
State investigating cyberintrusion
The U.S. State Department is investigating what could turn out to have been a major attack against its network. - Government Computer News
State Department hack escalates federal data insecurity
The attack against the U.S. State Department is worse than the theft of a laptop, Gartner analyst warns. - InformationWeek
Voice and VoIP phishing scams on the rise
VoIP gives the scammers the anonymity they need to carry out their operations, security experts warn. - InformationWeek
Researcher to show code for 'wormable' Windows flaw
The developer of the Metasploit hacking tool, HD Moore, claims to be just weeks away from demonstrating code that exploits a vulnerability in Windows that Microsoft fixed this week. - InfoWorld
Super firewall aims to stop DDoS
European researchers are working on a firewall technology that could stop distributed denial of service attacks from causing damage. - InfoWorld
Cisco details new VoIP, router vulnerabilities
Network equipment giant Cisco has disclosed a number of vulnerabilities in CallManager and the web-based interface for its routers. - InternetWeek.com
Spam ratios on the rise
The ratio of spam to legitimate email is rising, warns security firm MessageLabs. - NewsFactor
Israeli websites attacked
The fighting between Israel and Lebanon has apparently been taken into cyberspace leading to attacks against Israeli websites. - Red Herring
CSI/FBI: Security losses down
The FBI and the Cybersecurity Institute reports that the number of attacks and the losses from these attacks are down from last year. - TechWeb
Debian organisation server hacked
The Debian Linux organisation's gluck server has been hacked resulting in a shut down of multiple services used by developers. - The Inquirer
Phishers rip into two-factor authentication
A recent phishing attack using a man-in-the-middle strategy shows that two-factor authentication is no silver bullet against phishing. - The Register
Phishers crack two-factor authentication
Security researchers warns about an attack against Citibank's two-factor authentication system using man-in-the-middle tactics. - Vnunet.com
Mobiles set for key role in card authentication
Cellular phones are well suited to be used to authenticate financial transactions. - Vnunet.com
New worm targets virus researchers
A new piece of malware is targetting a popular reverse engineering tool used by security and virus researchers. - Vnunet.com
0 Comments:
Post a Comment
<< Home