using

Third of UK businesses using niche ISPs

Third of UK businesses using niche ISPs

But only five per cent of consumers.
Jan 30 2007 9:43AM
Phishers using Flash to evade filters

Phishers using Flash to evade filters

Cutting-edge phishers are creating websites in Flash to evade detection by toolbars, security experts said this week.
Jan 5 2007 7:10PM
Phishing scams using FFIEC deadline to dupe financial customers

Phishing scams using FFIEC deadline to dupe financial customers

CSOs and governance officers aren't the only ones studying up on compliance regulations. Phishers are also getting governance-savvy, sending bogus emails that pretend to bring customers in line with new guidelines for financial organisations.
Nov 29 2006 9:31AM
Using proper standards for organisational security

Using proper standards for organisational security

In the last couple of years, the role of the information security function in many organisations has achieved recognition as an important component of the organisation's overall risk management strategy.
Nov 1 2006 10:04PM
Trojan using SMS messages to relay information, says McAfee

Trojan using SMS messages to relay information, says McAfee

A backdoor trojan is using short message service (SMS) text messages to relay stolen information back to malicious users, according to one anti-virus vendor's research wing.
Oct 16 2006 7:59PM
Pump-and-dump spam using subliminal signals

Pump-and-dump spam using subliminal signals

'Buy!' message embedded in share scams.
Sep 8 2006 10:13AM
Update: Criminals increasingly using SQL code

Update: Criminals increasingly using SQL code

Criminals are increasingly using structured query language (SQL) code to obtain the personal information of consumers through databases, internet monitoring vendor SecureWorks has warned.
Aug 14 2006 2:44PM
Update: Criminals increasingly using SQL code

Update: Criminals increasingly using SQL code

Criminals are increasingly using structured query language (SQL) code to obtain the personal information of consumers through databases, internet monitoring vendor SecureWorks has warned.
Aug 14 2006 2:44PM
Update: Criminals increasingly using SQL code

Update: Criminals increasingly using SQL code

Criminals are increasingly using structured query language (SQL) code to obtain the personal information of consumers through databases, internet monitoring vendor SecureWorks has warned.
Aug 14 2006 2:44PM
Update: Criminals increasingly using SQL code

Update: Criminals increasingly using SQL code

Criminals are increasingly using structured query language (SQL) code to obtain the personal information of consumers through databases, internet monitoring vendor SecureWorks has warned.
Aug 14 2006 2:44PM
Update: Criminals increasingly using SQL code

Update: Criminals increasingly using SQL code

Criminals are increasingly using structured query language (SQL) code to obtain the personal information of consumers through databases, internet monitoring vendor SecureWorks has warned.
Aug 14 2006 2:44PM
Spammers using images to evade detection

Spammers using images to evade detection

The amount of spam email using images has increased by a factor of 12 in the past year as spammers attempt to avoid detection, a new study has found.
Jun 30 2006 9:58AM
New Bagle variant using .zip attachments

New Bagle variant using .zip attachments

The ever-present Bagle worm again is making the rounds, this time spreading as an emailed .zip attachment encrypted with a password.
Jun 21 2006 8:49PM
Phishers using VoIP for new scheme

Phishers using VoIP for new scheme

A messaging security firm identified two new attacks this week that use voice over internet protocol (VoIP) to carry out phishing schemes.
Apr 27 2006 9:42PM
Using events-per-second as a factor in selecting SEM tools

Using events-per-second as a factor in selecting SEM tools

Events Per Second, or EPS, as it is commonly referred to in the world of network security, is a measurement that is used to convey how fast a network generates data from its security devices (firewalls, Intrusion Detection Systems (IDS), servers, routers, etc.), and/or how fast an SEM product can correlate data from those devices. A savvy buyer will match the EPS his network is generating to those that can be accommodated by the SEM tool that he is purchasing.
Oct 19 2004 5:46PM
Spammers using new email authentication protocol

Spammers using new email authentication protocol

Spammers are using Sender Policy Framework (SPF), a new email authentication protocol, to make their messages appear legitimate, according to a study by email security firm MX Logic.
Sep 9 2004 5:07PM
Using Application Service Providers Securely

Using Application Service Providers Securely

Organizations are increasingly relying on application service providers (ASPs) to perform critical functions in their environments.
Jan 16 2004 1:49PM
Using File Hashes to Reduce Forensic Analysis

Using File Hashes to Reduce Forensic Analysis

The "hashkeeper" paradigm or model was first introduced a number of years ago by Brian Deering of the National Drug Intelligence Center (www.hashkeeper.org).
Jan 14 2004 1:27PM

Log In

  |  Forgot your password?