through

Phishing worm rips through MySpace

Phishing worm rips through MySpace

Worm spooks site and tries to cash in on malware.
Iain Thomson Dec 6 2006 8:57AM Security
New Apple QuickTime worm rapidly spreading through MySpace

New Apple QuickTime worm rapidly spreading through MySpace

An Apple QuickTime exploit is using MySpace's enormous user base to launch a blended cross-site scripting attack that, if successful, steals users' log-in credentials and installs adware on victims' machines, security researchers said today.
Dan Kaplan Dec 5 2006 12:20PM Security
Attackers target teenagers through fake IM profiles

Attackers target teenagers through fake IM profiles

Malicious users are targeting young instant messaging (IM) enthusiasts through bogus profiles that redirect them to adult websites, where adware is installed on their PCs.
Frank Washkuch Nov 30 2006 7:15AM Security
Malicious 'MySpace pages' install adware through fake You Tube video

Malicious 'MySpace pages' install adware through fake You Tube video

Multiple user pages on MySpace contain spoofed videos that appear to be from You Tube but are embedded with an installer for the Zango Cash Toolbar, researchers warned this week.
Frank Washkuch Nov 8 2006 8:04PM Security
Update: Microsoft falls through XML flaw

Update: Microsoft falls through XML flaw

Security experts at Symantec issued a warning yesterday about an exploit spotted in the wild for an as yet unpatched vulnerability in Microsoft's XML core services.
Clement James Nov 8 2006 9:27AM Security
Microsoft changes course, opens kernel code through APIs

Microsoft changes course, opens kernel code through APIs

After several weeks of heated fingerpointing from major security firms about getting locked out of Windows Vista, Microsoft has slightly switched course with two key security features in the soon-to-be-released operating system.
Ericka Chickowski Oct 17 2006 5:19AM Security
Trojan spreads through Putin death spam

Trojan spreads through Putin death spam

A new spam campaign posing as a breaking news report about the death of Russian President Vladimir Putin is actually an attempt by hackers to infect computer users with a trojan.
René Millman Jul 13 2006 10:21AM Security
Advance commerce through innovation

Advance commerce through innovation

Smart cards make perpetrating fraud considerably more difficult than "traditional" magstripe cards. In regions where offline processing is the dominant method for processing transactions this especially is true. As a result — and even though we have driven payment card fraud to an all-time low — our industry is now seriously exploring how smart card technology can become the primary driver in the evolution of payment card security.
Staff Writers Jun 5 2006 9:03PM Security
Reduce risk through vendor onus

Reduce risk through vendor onus

Many of us are struggling to extend security responsibility and accountability to third-party vendors and outsourcing companies.
Richard Lawhorn May 10 2006 8:05PM Security
Bogus iTunes file spreads worm through IM

Bogus iTunes file spreads worm through IM

A new worm disguised as an iTunes file is slowly infecting AOL Instant Messenger users.
Melissa Loveday Jul 22 2005 12:41PM Security
Enterprises give mobile solutions a walk through

Enterprises give mobile solutions a walk through

Australian businesses are trialling mobile solutions in a bid to streamline processes and gain a competitive edge, according to a survey.
Emily Kerry Nov 29 2004 12:00AM Telco/ISP
Updated: Hundreds of products fall through MIME security flaw

Updated: Hundreds of products fall through MIME security flaw

Serious security flaws that potentially affect hundreds of email gateway products have been discovered in the widely deployed MIME (Multi-Purpose Internet Mail Extensions) protocol.
Rob Jaques Sep 13 2004 9:45AM Security
Defending your IT infrastructure through effective patch management

Defending your IT infrastructure through effective patch management

Imagine that you are the IT Director of a large retail bank with an active and highly visible Internet banking service. Driving into the office, half-listening to the radio news, you hear your bank’s name being announced. Immediately followed by the words "hacker," "massive system failure" and "identity theft."
David D'Agostino Aug 25 2004 10:27AM Security
Making customers jump through hoops

Making customers jump through hoops

The purpose of multi-channel banking is to make things easier for the customer to access his or her account wherever and whenever they need to. However, with the increasing number of channels coming on stream, the architecture is becoming much more complicated and expensive to administer for banks and building societies.
Steve Keohane Jul 27 2004 5:25PM Security
Security through compartmentalisation

Security through compartmentalisation

Whether you call it layered perimeter defences, virtual teams, secure compartments, secure enclaves, or even virtual LANs, the concepts share the same goals: isolate and protect information assets from unauthorised access using more than single perimeter protection.
James Janisse Jun 1 2004 12:23PM Security
Corporations Risk Harboring Infoterrorists through Negligence

Corporations Risk Harboring Infoterrorists through Negligence

Terrorism is not a new phenomenon but has gained special popularity recently.
Jacques Halé Jan 19 2004 11:30AM Security
PKI - Why Go Through the Hassle?

PKI - Why Go Through the Hassle?

As email increasingly substitutes for the use of letters and faxes, even in government departments, and as commercial transactions on the web get more and more important, the need for secure communications grows.
Guy Vancollie Jan 15 2004 10:46AM Security
Privacy Falls Through the Web

Privacy Falls Through the Web

You wouldn’t walk around the King of Prussia Mall with your social security number tattooed on your forehead.
Lou D’Ambrosio Jan 9 2004 4:42PM Security

Log In

  |  Forgot your password?