Week in review: Nikon image authentication system cracked, fake AV for mobile platform and the PSN hack
Here’s an overview of some of last week’s most interesting news, articles and reviews: Wardriving gang targeting small firms A group of individuals who are …
PSN hackers claim to have 2+ million credit card numbers
The PlayStation Network hack is now considered to be one among the biggest data thefts of all time, and according to the claims made by the alleged hackers on underground …
DSL Reports intrusion compromises over 9000 accounts
DSL Reports – the information and review site on high speed Internet services which operates over 200 forums – has been hit with a blind SQL injection attack, …
Firefox 4.0.1 fixes several security issues
Mozilla released Firefox 4.0.1 that fixes several security issues as well as stability issues. Miscellaneous memory safety hazards Mozilla developers identified and fixed …
Rapid adoption of hosted email compliance
Financial institutions are rapidly moving to hosted email compliance and storage services to deal with increasing costs, risks and regulations, according to a study conducted …
Researchers crack Nikon image authentication system
Credibility of photographic evidence may be extremely important in a variety of situations. Courts, news agencies and insurance companies may accept digitally signed …
Page-integrated encryption for protecting credit cards on the web
Voltage Security announced a new encryption breakthrough for protecting personal data entered by consumers on web pages called PIE for Page-Integrated Encryption. The company …
Millions stolen from U.S. businesses wired to Chinese companies
Small-to-medium sized businesses and public institutions are being targeted by fraudsters that compromise corporate banking credentials and transfer corporate funds to Chinese …
Fake AV for mobile platform detected
Fake antivirus software for Windows crop up daily, but it seems that mobile users will also have to start being on the lookout for such scams. CA researchers have spotted a …
FBI decimates Coreflood botnet, hints at unprecedented actions
Some two weeks have passed since the U.S. Department of Justice and the FBI have been granted by the federal court the permission to substitute the C&C servers of the …
Malicious use of subdomain services surges
The malicious use of subdomain services by phishers nearly doubled in the second half of 2010, with phishing gangs using these services about as often as they register domain …
“You’ve got a postcard” spam emails lead to fake AV
Easter has come and passed, but the threat of bogus e-cards is alive as it ever was. This particular method of luring users to malicious pages or to download malicious …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence