|
|
|
Articles by eccuni - |
171. ENISA Issues Recommendations to Combat Botnet Threats
March 14, 2011
The modus operandi of cybercrime has evolved over a period of time. One of the sophisticated techniques developed by offenders to perpetuate crime is use of botnets. In this case, offenders infect individual computers with malware and then create a chain of numerous compromised computers. The compro...
|
|
|
172. Microsoft's Patch Tuesday Addresses 4 Security Vulnerabilities
March 10, 2011
Recently, Microsoft released three security bulletins, which address four vulnerabilities. The first security bulletin addresses critical vulnerabilities associated with DirectShow, Windows Media Player and Windows Media Center. The remaining two security bulletins mitigate a security flaw associate...
|
|
|
173. Security Experts Detect New Trojan Targeting Blackberry Operating System
March 09, 2011
The last few years have witnessed increased popularity of smartphones. They offer numerous features, which enhance user experience. However, smartphones and other mobile devices are not immune to security threats. Recently, security researchers at Trend Micro identified a Zeus Trojan variant that ta...
|
|
|
174. Security Experts at Symantec Identify New Banking Trojan
March 09, 2011
Over the last few years, the finance and banking industry has been tackling with a range of sophisticated financial malware including Zeus, Bugat, and the more recent Zitmo Trojan and their variants. Usually, banking Trojans are designed to extract authentication information transmitted between a us...
|
|
|
175. University of South Carolina Notifies Individuals on Security Breach
March 06, 2011
Data breach may result in disclosure of sensitive personal information related to the affected individuals. Data breach may be caused due to a security lapse, intrusion by cybercriminals and human error. Recently, University of South Carolina reported a computer security breach, which caused leakage...
|
|
|
176. Teenage Cyber Fraudster Jailed for Five Years
March 06, 2011
Online degree and e-learning programs may help investigative professionals in understanding the different types of online crime strategies adopted by criminals. The United Kingdom (U.K) government has decided to provide funding of around 30 million GBP to regional e-crime centers to effectively ...
|
|
|
177. Google Patches 19 Security Flaws in Chrome
March 03, 2011
Recently, Google updated Chrome to 9.0.597.107 for all supporting platforms. The latest update mitigates 19 vulnerabilities. Out of 19 vulnerabilities, 16 are rated as high risk bugs by the company, while the remaining three have been rated as medium risk vulnerabilities. Google rates those bugs as ...
|
|
|
178. Gmail Users Suffer Disruption in Service
March 02, 2011
E-mail is fast becoming a predominant means of personal and business communication. Paper-based communication is replaced to a large extent by electronic communication in the form of e-mail. Individual and organizations rely heavily on e-mail communications. As such, disruption of e-mail services o...
|
|
|
179. Security Experts Identify New Mac OS X Backdoor Trojan
February 28, 2011
Developers constantly endeavor to produce new and improved software products. However, the success of a new product attracts the attention of cybercriminals, who persistently explore and exploit vulnerabilities. Recently, security researchers at Sophos identified a new backdoor Trojan, which affec...
|
|
|
180. Governors Deliberate on Cyber Threats
February 28, 2011
The challenges in cyberspace are vibrant and IT security professionals face manifold challenges in defending the national assets from cyber threats. The cyberspace is today characterized of frequent attacks on websites, computers and networks of public and private organizations by individuals, cyber...
|
|
|
|
|
|
>
|
|
|
|
|
Author Login |
|
|
Advertiser Login
ADVERTISE HERE NOW!
Limited Time $60 Offer!
90 Days-1.5 Million Views
|
|
TIM FAY
After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
|
|
|
|
|
GENE MYERS
Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
|
|
|
|
|
LAURA JEEVES
At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
|
|
|
|
|
ALEX BELSEY
I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
|
|
|
|
|
SUSAN FRIESEN
Located in the lower mainland of B.C., Susan Friesen is a visionary brand strategist, entrepreneur, ...more
|
|
|
|
|
STEPHEN BYE
Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more
|
|
|
|
|
SHALINI MITTAL
A postgraduate in Fashion Technology. Shalini is a writer at heart! Writing for her is an expression...more
|
|
|
|
|
ADRIAN JOELE
I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
|
|
|
|
|
JAMES KENNY
James is a Research Enthusiast that focuses on the understanding of how things work and can be impro...more
|
|
|
|