Here’s an overview of some of last week’s most interesting news, reviews and videos:
Splunk.com password leak
Splunk announced on their blog that they discovered the logging of users’ passwords in clear text.
CAPTCHA solving farms headed for extinction?
Looking for the lowest possible price for which people will solve these “puzzles”, spammers have turned towards the developing world.
Facebook shows its true face
The F8 conference has ended, and Facebook has started making changes and setting the stage for the announced spread through the entire Internet.
iPad users with PCs threatened by backdoor malware
A malicious spam email campaign has been targeting iPad users who own PCs, says Bitdefender.
Scammers’ link architectures
Over time, online scammers have developed a series of “link architectures” that are aimed at increasing their pages’ Google ranking and, consequently, bringing more traffic their way.
Changes in new ZeuS variants
A peak into the new variants of the Trojan and the changes that will assure its longevity for a good while yet.
A closer look at EXE Password Protector
Eltima’s EXE Password Protector allows you to password-protect any Windows executable file, which means that only the person who knows the password will be able to launch the application.
Perception of data security at odds with reality
Nearly three-quarters of organizations believe they have adequate policies in place to protect sensitive, personal information, yet more than half have lost sensitive data within the past two years.
Poisoned search results: Our daily reality
Since the moment when search engines have largely become the starting point for our daily surfing, the risk of landing on a compromised site serving malware has been increasing.
Securing the Borderless Network: Security for the Web 2.0 World
How do we protect a borderless network? This book aims to be a clear and concise guide that will help IT decision-makers understand and solve the problems they are likely to encounter as their enterprise becomes borderless.
In the security of mobile devices we trust, say users
The majority of mobile device users worldwide feel safe using their mobile devices for applications, including access online banking, according to research by Unisys.
Introduction to malware analysis
In this video, Lenny Zeltser introduces you to the process of reverse-engineering malicious software. He outlines behavioral and code analysis phases, making this topic accessible even to individuals with a limited exposure to programming concepts.
European privacy concerns regarding U.S. policies
There are a lot of people in Europe who feel that governments and companies should not be able to collect information of individuals so they can use it in ways that violate the privacy of individuals.
Symantec acquires PGP
By bringing together PGP and GuardianEdge’s standards-based encryption capabilities for full-disk, removable media, email, file, folder and smartphone, with with its own endpoint security and data loss prevention offerings, Symantec will have the broadest set of integrated data protection solutions.
Majority unaware of how sensitive data is stored online
The majority of U.S. citizens are unaware of how their online data is stored and who secures it. They are also unsure who should be responsible for protecting sensitive, online data.
A possible solution for banking Trojans?
The recent disconnection of the Troyak ISP showed that bot herders are ready for such actions. Obviously, this approach obviously doesn’t work. But, what does?