White House Cracks Down On Cyberespionage

February 22, 2013 fdesir 0

An interesting article  form Dark reading in there advanced-threats sections on Cyberespionage: The Obama administration is turning up the heat on nation-state cyberespionage attackers: A new policy aimed at protecting the U.S. government and businesses […]

A List of Top WordPress Security Plugins by EUKHOST.com

January 30, 2012 SecurityOrb_Staff 0

The ratio of websites running on CMS’s can be assumed to be more than the custom designed sites built from scratch. Quite understandably, there are more number of users using WordPress than any other CMS, hence it becomes crucial to have enhanced security measures for your site. Due to a large volume of users using WordPress as a platform, an increasing number of hackers and fraudsters try to compromise the security of such sites. In majority of the instances sites running on WordPress are compromised due to outdated files and/or plug-ins. Such outdated versions of the associated scripts act as an easy meal for fraudsters. […]

Google Releases Chrome 16.0.912.77

January 24, 2012 admin 0

US-Cert has just distributed a notification about the release of Chrome 16.0.912.77 for Linux, Mac, Windows, and Chrome Frame to address multiple vulnerabilities.
The vulnerabilities may allow an attacker to execute arbitrary code or
cause a denial-of-service condition. […]

Scammers waste no time in exploiting Steve Jobs’ death

October 7, 2011 SecurityOrb_Staff 0

As much of the world mourns the passing of Steve Jobs — one of the technology industry’s greatest visionaries — the bottom feeders of the cyber crime world are greedily exploiting the tragedy through scams promising unwitting users a chance to win a free iPad.

Sophos has reported in its Naked Security blog on one such scam already circulating via Facebook that reads as follows: “In memory of Steve, a company is giving out 50 ipads tonight. R.I.P. Steve Jobs,” followed by a tailored bit.ly link ending with “restinpeace-steve-jobs.” Clicking the link takes users to one of countless malicious Web pages. […]

1 3 4 5 6