using

Third of UK businesses using niche ISPs

Third of UK businesses using niche ISPs

But only five per cent of consumers.
Matt Chapman Jan 30 2007 9:43AM Telco/ISP
Phishers using Flash to evade filters

Phishers using Flash to evade filters

Cutting-edge phishers are creating websites in Flash to evade detection by toolbars, security experts said this week.
Dan Kaplan Jan 5 2007 7:10PM Security
Phishing scams using FFIEC deadline to dupe financial customers

Phishing scams using FFIEC deadline to dupe financial customers

CSOs and governance officers aren't the only ones studying up on compliance regulations. Phishers are also getting governance-savvy, sending bogus emails that pretend to bring customers in line with new guidelines for financial organisations.
Frank Washkuch Nov 29 2006 9:31AM Security
Using proper standards for organisational security

Using proper standards for organisational security

In the last couple of years, the role of the information security function in many organisations has achieved recognition as an important component of the organisation's overall risk management strategy.
Rudy Bakalov, Nov 1 2006 10:04PM Security
Trojan using SMS messages to relay information, says McAfee

Trojan using SMS messages to relay information, says McAfee

A backdoor trojan is using short message service (SMS) text messages to relay stolen information back to malicious users, according to one anti-virus vendor's research wing.
Frank Washkuch Oct 16 2006 7:59PM Security
Pump-and-dump spam using subliminal signals

Pump-and-dump spam using subliminal signals

'Buy!' message embedded in share scams.
Andrew Charlesworth Sep 8 2006 10:13AM Security
Update: Criminals increasingly using SQL code

Update: Criminals increasingly using SQL code

Criminals are increasingly using structured query language (SQL) code to obtain the personal information of consumers through databases, internet monitoring vendor SecureWorks has warned.
Staff Writers Aug 14 2006 2:44PM Security
Update: Criminals increasingly using SQL code

Update: Criminals increasingly using SQL code

Criminals are increasingly using structured query language (SQL) code to obtain the personal information of consumers through databases, internet monitoring vendor SecureWorks has warned.
Staff Writers Aug 14 2006 2:44PM Security
Update: Criminals increasingly using SQL code

Update: Criminals increasingly using SQL code

Criminals are increasingly using structured query language (SQL) code to obtain the personal information of consumers through databases, internet monitoring vendor SecureWorks has warned.
Staff Writers Aug 14 2006 2:44PM Security
Update: Criminals increasingly using SQL code

Update: Criminals increasingly using SQL code

Criminals are increasingly using structured query language (SQL) code to obtain the personal information of consumers through databases, internet monitoring vendor SecureWorks has warned.
Staff Writers Aug 14 2006 2:44PM Security
Update: Criminals increasingly using SQL code

Update: Criminals increasingly using SQL code

Criminals are increasingly using structured query language (SQL) code to obtain the personal information of consumers through databases, internet monitoring vendor SecureWorks has warned.
Staff Writers Aug 14 2006 2:44PM Security
Spammers using images to evade detection

Spammers using images to evade detection

The amount of spam email using images has increased by a factor of 12 in the past year as spammers attempt to avoid detection, a new study has found.
Staff Writers Jun 30 2006 9:58AM Security
New Bagle variant using .zip attachments

New Bagle variant using .zip attachments

The ever-present Bagle worm again is making the rounds, this time spreading as an emailed .zip attachment encrypted with a password.
Dan Kaplan Jun 21 2006 8:49PM Security
Phishers using VoIP for new scheme

Phishers using VoIP for new scheme

A messaging security firm identified two new attacks this week that use voice over internet protocol (VoIP) to carry out phishing schemes.
Dan Kaplan Apr 27 2006 9:42PM Security
Using events-per-second as a factor in selecting SEM tools

Using events-per-second as a factor in selecting SEM tools

Events Per Second, or EPS, as it is commonly referred to in the world of network security, is a measurement that is used to convey how fast a network generates data from its security devices (firewalls, Intrusion Detection Systems (IDS), servers, routers, etc.), and/or how fast an SEM product can correlate data from those devices. A savvy buyer will match the EPS his network is generating to those that can be accommodated by the SEM tool that he is purchasing.
Roberto Angelino, Oct 19 2004 5:46PM Security
Spammers using new email authentication protocol

Spammers using new email authentication protocol

Spammers are using Sender Policy Framework (SPF), a new email authentication protocol, to make their messages appear legitimate, according to a study by email security firm MX Logic.
Marcia Savage Sep 9 2004 5:07PM Security
Using Application Service Providers Securely

Using Application Service Providers Securely

Organizations are increasingly relying on application service providers (ASPs) to perform critical functions in their environments.
Jonathan Gossels Jan 16 2004 1:49PM Security
Using File Hashes to Reduce Forensic Analysis

Using File Hashes to Reduce Forensic Analysis

The "hashkeeper" paradigm or model was first introduced a number of years ago by Brian Deering of the National Drug Intelligence Center (www.hashkeeper.org).
Dan Mares Jan 14 2004 1:27PM Security

Log In

  |  Forgot your password?