Before we get into this month’s release, we wanted to alert you to updates to a document that’s been central to much of how Microsoft thinks about security. Ten years ago, Microsoft penned the “Ten Immutable Laws of Security,” which debuted on TechNet. It was written...
IDG News Service - Web mail users at Yahoo and Hotmail have been hit with the same kind of targeted attacks that were disclosed earlier this week by Google, according to security software vendor Trend Micro.
Trend Micro described two similar attacks against Yahoo Mail and Windows Live Hotmail...
Just hours after Apple updated a security update to protect Mac users against a rash of scareware attacks, a new variant began circulating that completely bypasses the malware-blocking measure.
The trojan arrives in a file called mdinstall.pkg and installs MacGuard, a malicious application...
BOSTON (Reuters) – A computer security researcher has found a flaw in Microsoft Corp's widely used Internet Explorer browser that he said could let hackers steal credentials to access FaceBook, Twitter and other websites.
He calls the technique "cookiejacking."
"Any website. Any cookie...
browser flaw
cookiejacking
credentials
cybersecurity
data theft
explorer
hacking
internet explorer
malware
microsoft
online safety
privacy
researcher
security
socialengineering
tech news
user interaction
vulnerability
web security
windows
IDG News Service - The next time a website says to download new software to view a movie or fix a problem, think twice. There's a pretty good chance that the program is malicious.
In fact, about one out of every 14 programs downloaded by Windows users turns out to be malicious, Link Removed...
Amazon retailers are being targeted by fraudsters who have created a custom-built a program that generates fakes receipts for nonexistent orders, according to researchers from GFI Software.
he program is designed to create a customized HTML file that closely resembles an actual Amazon.com...
Source: Neowin.net - Exclusive: New Facebook exploit hits the web
Update: If your account has been hijacked, take the following steps:
1) Visit the Facebook "Upload via Email" page
2) Click "Send me my upload email"
3) Click the "refresh your upload email" link. This will reset your...
account hijack
automation
browser
cybersecurity
data privacy
exploit
facebook
internet
javascript
manual process
personal data
photos
risk
security
socialengineering
status updates
update
user awareness
vulnerabilities
web services
Scareware pushers have upped their cheating techniques are and now offering live chat and localization for their deceptive products. Security researchers reveal that technical support is provided by real people.
Scareware, also known as rogueware, refers to malicious applications that pose as...
antivirus
cyber threats
cybersecurity
deceptive products
fake threats
kaspersky
live chat
localization
malicious software
malware
online support
rogueware
scareware
security
socialengineering
support services
tech support
trial version
uninstaller
user feedback
Link Removed - Invalid URL
Authors of rogue antivirus software hesitate little when it comes down to copying the design and branding of official security solutions in an attempt to pass their fake antivirus code as genuine offerings. It is, of course, just one of the aspects of the social...
Link Removed - Invalid URL
This year alone they will be responsible for infecting in excess of 25 million computers worldwide, but they could come close to compromising as much as 30 million machines. At the root of this epidemic lay simple social engineering tactics designed, through various...
World of Warcraft users get another worry
Sexy girls are not always what they seem
By Link Removed - Invalid URL
Friday, 27 November 2009, 12:15
INSECURITY FIRM Sophos is warning World of Warcraft users to be on the look out for sexy strangers bearing dangerous gifts.
According to the...