IE8 exposes sites to XSS attacks
It’s a little bit ironic when the thing that you put in place to protect you from certain attacks, it’s the thing that, in the end, makes you vulnerable to them. …
MySpace phishing and malware combo
F-Secure warns about phishing emails that urge users to update their MySpace accounts. If you fall for the trick and follow the link, you are taken to a fake MySpace page, …
Aggressive malware attack disguised as Flash player upgrade
Red Condor issued a warning about the latest spam campaign that contains a phishing ploy and a malware threat. The email requests that recipients click on a link in the body …
Mobile data security doubts
A survey of 104 enterprise mobility professionals showed that more than two thirds of European organizations surveyed are not fully aware what sensitive data is stored within …
Online financial security threats: What can we expect in 2010?
Ori Eisen, Chief Innovation Officer at 41st Parameter, highlights the top five financial security threats which emerged as the biggest money makers for fraudsters and where he …
Trend Micro blocks phishing attempt from “Trend Micro”
It must have been a special pleasure for Trend Micro to block access to the phishing URL and domain that used their name and reputation to scam people. Their analysts came …
FBI’s network against cyber crime
Last week, when the Senate’s Subcommittee on Terrorism and Homeland Security held a hearing entitled “Cybersecurity: Preventing Terrorist Attacks and Protecting …
iPhone worm turns devices into zombies
It took three weeks for someone to again take advantage of the vulnerability that leaves the owners of jailbroken iPhones exposed to attacks, and this time the attack is …
Latest 0-day Internet Explorer exploit
A new exploit made public by an unknown individual on the BugTraq mailing list on Friday could be soon used for attacking unsuspecting surfers that use Internet Explorer 6 and …
New risk management ISO standard
The new ISO standard for effective management of risk ISO 31000 provides principles, framework and a process for managing any form of risk in a transparent, systematic and …
Workers stealing data for competitive edge
The recession is creating camaraderie amongst workforces, at the expense of their employers, is the finding of a transatlantic survey. Carried out amongst 600 office workers …
Week in review: Zbot Trojan arrests, 0-day Firefox vulnerabilities and new (IN)SECURE Mag
Here’s an overview of some of last week’s most interesting news, interviews and articles: Most security products fail to perform Nearly 80 percent of security …