Week in review: IE vulnerabilities, iPhone anti-virus and security threats for 2010
Here’s an overview of some of last week’s most interesting news, interviews and articles: Workers stealing data for competitive edge 85% of people admit they know …
iPhone anti-virus software: Has the time come?
Anti-virus software has already been made available for various mobile phones. Security firm F-Secure offers protection for phones with Windows Mobile and Symbian and …
Skype users targeted by Koobface look-alike
Trend Labs warn about a seeming Koobface variant – TROJ_VILSEL.EA – that targets Skype. It steals information from the user’s Skype profile: login …
Online banking security risks through European eID cards
A new paper by the European Network and Information Security Agency (ENISA) focuses on authentication risks with European eID Cards. It analyzes 7 vulnerabilities, identifies …
(IN)SECURE Magazine on the Amazon Kindle
Amazon’s coveted Kindle e-reader just got a firmware update that among other things, gives users the ability to read native PDF files. Naturally we had to investigate …
Macbook Air prize spam delivers malware
A good rule of thumb when it comes to unsolicited email offers or announcements should be: If it’s too good to be true, it probably is. Add to this grammatical and/or …
Cloud computing pros and cons
Cloud computing – what is it exactly and what benefits does it bring? A new white paper from ISACA describes how enterprises can achieve greater efficiencies and …
IE8 exposes sites to XSS attacks
It’s a little bit ironic when the thing that you put in place to protect you from certain attacks, it’s the thing that, in the end, makes you vulnerable to them. …
MySpace phishing and malware combo
F-Secure warns about phishing emails that urge users to update their MySpace accounts. If you fall for the trick and follow the link, you are taken to a fake MySpace page, …
Aggressive malware attack disguised as Flash player upgrade
Red Condor issued a warning about the latest spam campaign that contains a phishing ploy and a malware threat. The email requests that recipients click on a link in the body …
Mobile data security doubts
A survey of 104 enterprise mobility professionals showed that more than two thirds of European organizations surveyed are not fully aware what sensitive data is stored within …
Online financial security threats: What can we expect in 2010?
Ori Eisen, Chief Innovation Officer at 41st Parameter, highlights the top five financial security threats which emerged as the biggest money makers for fraudsters and where he …