through

Phishing worm rips through MySpace

Phishing worm rips through MySpace

Worm spooks site and tries to cash in on malware.
Dec 6 2006 8:57AM
New Apple QuickTime worm rapidly spreading through MySpace

New Apple QuickTime worm rapidly spreading through MySpace

An Apple QuickTime exploit is using MySpace's enormous user base to launch a blended cross-site scripting attack that, if successful, steals users' log-in credentials and installs adware on victims' machines, security researchers said today.
Dec 5 2006 12:20PM
Attackers target teenagers through fake IM profiles

Attackers target teenagers through fake IM profiles

Malicious users are targeting young instant messaging (IM) enthusiasts through bogus profiles that redirect them to adult websites, where adware is installed on their PCs.
Nov 30 2006 7:15AM
Malicious 'MySpace pages' install adware through fake You Tube video

Malicious 'MySpace pages' install adware through fake You Tube video

Multiple user pages on MySpace contain spoofed videos that appear to be from You Tube but are embedded with an installer for the Zango Cash Toolbar, researchers warned this week.
Nov 8 2006 8:04PM
Update: Microsoft falls through XML flaw

Update: Microsoft falls through XML flaw

Security experts at Symantec issued a warning yesterday about an exploit spotted in the wild for an as yet unpatched vulnerability in Microsoft's XML core services.
Nov 8 2006 9:27AM
Microsoft changes course, opens kernel code through APIs

Microsoft changes course, opens kernel code through APIs

After several weeks of heated fingerpointing from major security firms about getting locked out of Windows Vista, Microsoft has slightly switched course with two key security features in the soon-to-be-released operating system.
Oct 17 2006 5:19AM
Trojan spreads through Putin death spam

Trojan spreads through Putin death spam

A new spam campaign posing as a breaking news report about the death of Russian President Vladimir Putin is actually an attempt by hackers to infect computer users with a trojan.
Jul 13 2006 10:21AM
Advance commerce through innovation

Advance commerce through innovation

Smart cards make perpetrating fraud considerably more difficult than "traditional" magstripe cards. In regions where offline processing is the dominant method for processing transactions this especially is true. As a result — and even though we have driven payment card fraud to an all-time low — our industry is now seriously exploring how smart card technology can become the primary driver in the evolution of payment card security.
Jun 5 2006 9:03PM
Reduce risk through vendor onus

Reduce risk through vendor onus

Many of us are struggling to extend security responsibility and accountability to third-party vendors and outsourcing companies.
May 10 2006 8:05PM
Bogus iTunes file spreads worm through IM

Bogus iTunes file spreads worm through IM

A new worm disguised as an iTunes file is slowly infecting AOL Instant Messenger users.
Jul 22 2005 12:41PM
Enterprises give mobile solutions a walk through

Enterprises give mobile solutions a walk through

Australian businesses are trialling mobile solutions in a bid to streamline processes and gain a competitive edge, according to a survey.
Nov 29 2004 12:00AM
Updated: Hundreds of products fall through MIME security flaw

Updated: Hundreds of products fall through MIME security flaw

Serious security flaws that potentially affect hundreds of email gateway products have been discovered in the widely deployed MIME (Multi-Purpose Internet Mail Extensions) protocol.
Sep 13 2004 9:45AM
Defending your IT infrastructure through effective patch management

Defending your IT infrastructure through effective patch management

Imagine that you are the IT Director of a large retail bank with an active and highly visible Internet banking service. Driving into the office, half-listening to the radio news, you hear your bank’s name being announced. Immediately followed by the words "hacker," "massive system failure" and "identity theft."
Aug 25 2004 10:27AM
Making customers jump through hoops

Making customers jump through hoops

The purpose of multi-channel banking is to make things easier for the customer to access his or her account wherever and whenever they need to. However, with the increasing number of channels coming on stream, the architecture is becoming much more complicated and expensive to administer for banks and building societies.
Jul 27 2004 5:25PM
Security through compartmentalisation

Security through compartmentalisation

Whether you call it layered perimeter defences, virtual teams, secure compartments, secure enclaves, or even virtual LANs, the concepts share the same goals: isolate and protect information assets from unauthorised access using more than single perimeter protection.
Jun 1 2004 12:23PM
Corporations Risk Harboring Infoterrorists through Negligence

Corporations Risk Harboring Infoterrorists through Negligence

Terrorism is not a new phenomenon but has gained special popularity recently.
Jan 19 2004 11:30AM
PKI - Why Go Through the Hassle?

PKI - Why Go Through the Hassle?

As email increasingly substitutes for the use of letters and faxes, even in government departments, and as commercial transactions on the web get more and more important, the need for secure communications grows.
Jan 15 2004 10:46AM
Privacy Falls Through the Web

Privacy Falls Through the Web

You wouldn’t walk around the King of Prussia Mall with your social security number tattooed on your forehead.
Jan 9 2004 4:42PM

Log In

Email:
Password:
  |  Forgot your password?