Photos: The look and feel of SecurityByte 2011, part 2
Help Net Security attended this India’s largest information security conference in Bangalore – SecurityByte 2011. The first photo gallery is here. A group photo of …
Multi-layer fraud prevention from IronKey
IronKey introduced the next generation of online banking security: an integrated platform of multiple security controls. This approach reduces the risk of online banking fraud …
SplashID Enterprise: Centralized control of password administration
SplashData announced SplashID Enterprise 2.0, featuring updated Windows and Mac OS X clients, new mobile apps and a web-based application that enable enterprise users to …
Log Management 10 comes with compliance enhancements
Ipswitch announced its log management software solution, WhatsUp Log Management 10 which provides out-of-the-box security and compliance for businesses of all sizes. The …
HTML5-based mobile security platform
AirWatch released an HTML5-based MDM platform. By leveraging HTML5, AirWatch’s management console is now even more accessible from any web-connected device, regardless …
Scammers demand $143 from Windows users, threaten with file deletion
German Windows users are the latest target of some pretty brazen scammers, warns Panda Security. The whole thing starts with a Trojan – likely received via spammy emails …
iPhone 5 “test and keep” spam campaign
As the predictions about the release of iPhone 5 seem all to point to the beginning of October, cyber scammers have decided to add to the frenzy by offering the coveted device …
DigiNotar hacker shares details on GlobalSign breach
Yesterday, GlobalSign announced that it will not be issuing any more certificates until the claims about a breach into its networks made by the “Comodohacker” are …
Cybercriminals impersonating government agencies
GFI Software today announced its top 10 most prevalent threat detections for August 2011. Notable threats last month included spam and poisoned search engine results targeting …
Drupal Author Pane module security bypass weakness
A weakness has been reported in the Author Pane module for Drupal, which can be exploited by malicious people to bypass certain security restrictions, according to Secunia. …
How to deal with Internet security threats
How to use the Internet while staying secure has always been a concern for businesses. Over the last couple of years there have been many changes in the Internet threat …
Mobile malware criminal command-and-control activity
Criminal operators continue to hone their craft in 2011 using crimeware that can be repurposed for multiple fraud opportunities, sold or leased to other criminals, and that is …