Social Engineering: Tips to Protecting Yourself

May 31, 2013 admin 0

In the world of information security, ‘social engineering’ is a term that describes a non-technical way of hacking that relies on the hacker to collect information to bypass normal security controls. It is the art of manipulating users into performing actions or divulging confidential information. […]

APT Attacks Trace To India, Researcher Says

May 29, 2013 fdesir 0

A posting from information week on APT Attacks : A multi-year advanced persistent threat (APT) campaign that targeted the government of Pakistan, as well as global businesses operating in mining, automotive, engineering, military and finance sectors, among others, […]

3 Lessons From Layered Defense’s Missed Attacks

May 29, 2013 fdesir 0

a posting from Dark Reading in there  Vulnerability Management section: Layering security measures typically protects systems better: Research) by three University of Michigan graduate students in 2008, for example, found that using multiple antivirus engines result in […]

Gathering More Security Data From Your Endpoints

May 29, 2013 fdesir 0

A posting from Dark Reading in there  Endpoint Security section: Even though many of the most troublesome and advanced threats hitting enterprise networks originate from the endpoint, most organizations today aren’t investing in the same […]

Phishers try flattery with Facebook Page owners

May 28, 2013 fdesir 0

An interesting article in Naked Security on Phishers try flattery with Facebook Page owners: Beware, fanboys and fangirls: phishers are targeting Facebook Page owners with a bogus message supposedly sent from Facebook Security. According to Hoax-Slayer, the scam claims that Facebook […]

1 2 3 7
error: Content is protected !!