Security Hero Rotating Header Image

Posts Tagged ‘Proxy’

September

Huge uptick in spam-borne malware since mid-September The amount of the amount of spam containing malware increased ninefold during September over the previous month, according to Symantec. URL: http://feedproxy.google.com/~r/SCMagazineHome/~3/jKwGl-9DyV0/

Cyber Wiki page planned

Cyber Wiki page planned The U.S. Department of Homeland Security intends to contract with WiiKno, a Texas-based knowledge management solutions provider, to create a Wiki page for the agency that will be used to share information among the National Cyber Security Center and its six federal cybersecurity centers, according to a notice posted this week [...]

A rise in cybercrime hits SMBs

A rise in cybercrime hits SMBs Forty four percent of U.S. SMBs have been hit by some form of cybercrime and 10 percent were hit so bad that they had to stop production, according to a survey from Panda Security. URL: http://feedproxy.google.com/~r/SCMagazineHome/~3/94koVN-33Lg/

EMC Documentum IRM

EMC Documentum IRM EMC Documentum Information Rights Management (IRM) encrypts and persistently protects documents from unauthorized viewing, copying and printing, regardless of where the document physically resides. URL: http://feedproxy.google.com/~r/SCMagazineHome/~3/u3LKnkRqVIk/

Major spam campaign abusing Yahoo Groups

Major spam campaign abusing Yahoo Groups About one million spam emails per hour are being sent to Yahoo Groups and other free web services, including Google Groups and LiveJournal, containing bogus pharmaceutical advertising content. URL: http://feedproxy.google.com/~r/SCMagazineHome/~3/Hhgm3VDE7z4/

Protect yourself from business partners

Protect yourself from business partners Corporate and public-sector organizations are working with more business partners than ever before — and the number will continue to grow. Outsourcing, offshoring, supply-chain management, workflow management, value chains and emerging markets: These each signal a warning to information security managers. URL: http://feedproxy.google.com/~r/SCMagazineHome/~3/EZNfbwSyfQ4/

Nonprofit releases security configuration standards for iPhone

Nonprofit releases security configuration standards for iPhone Organizations issuing iPhones to their employers can now apply security configuration best practices, which were introduced this week by the Center for Internet Security. URL: http://feedproxy.google.com/~r/SCMagazineHome/~3/_97AOURFipo/

Nonprofit releases security configuration standards for iPhone

Nonprofit releases security configuration standards for iPhone Organizations issuing iPhones to their employers can now apply security best practices, which were introduced this week by the Center for Internet Security. URL: http://feedproxy.google.com/~r/SCMagazineHome/~3/_97AOURFipo/

VMware fixes security bugs

VMware fixes security bugs VMware has released fixes for multiple vulnerabilities in several of its products, including VMware Workstation, Player, ACE, Server, Fusion, ESX and ESXi. One of the vulnerabilities was caused by an error in the VMware Descheduled Time Accounting driver, which could open a way for hackers to launch a denial-of-service attack in [...]

Fed cybersecurity review out; “cyber coordinator” established

Fed cybersecurity review out; “cyber coordinator” established After much speculation, President Obama confirmed Friday that a new White House office will be dedicated to coordinating digital security efforts, to be led by a yet unnamed “cybsersecurity coordinator.” URL: http://feedproxy.google.com/~r/SCMagazineHome/~3/lcAodijEGk0/

New Windows zero-day

New Windows zero-day Microsoft on Thursday issued a security advisory for a new vulnerability in DirectX, used on Windows to enable graphics and sound, that could enable a remote hacker to execute arbitrary code if users open specially crafted QuickTime files. Microsoft said that it was aware of active attacks using exploit code for the [...]

Bank sues Savvis over 2005 CardSystems breach

Bank sues Savvis over 2005 CardSystems breach Utah-based Merrick Bank claims to have lost $16 million as a result of a 2005 breach of payment card processor CardSystems Solutions and is now seeking legal restitution. URL: http://feedproxy.google.com/~r/SCMagazineHome/~3/e8nFwgmuAVk/

IT company Savvis being sued over 2005 CardSystems breach

IT company Savvis being sued over 2005 CardSystems breach Utah-based Merrick Bank claims to have lost $16 million as a result of a 2005 breach of payment card processor CardSystems Solutions and is now seeking legal restitution. URL: http://feedproxy.google.com/~r/SCMagazineHome/~3/cGIdaI_QilE/

EMC snares Configuresoft

EMC snares Configuresoft EMC on Wednesday acquired Configuresoft, maker of server configuration, change and compliance EMC on Wednesday acquired Configuresoft, maker of server configuration, change and compliance management solutions. The purchase expands EMC’s storage and infrastructure management line. The two companies had been partnering since 2008 when they signed an OEM agreement, leading to the [...]

4113

4113 BAT/Agent.NBW, PDF/Exploit.Pidief.ONK, Win32/Adware.Antivirus2008 (2), Win32/Adware.Coolezweb (2), Win32/Adware.InternetAntivirus (5), Win32/Adware.SystemSecurity (4), Win32/Agent.NXT, Win32/Agent.PHC, Win32/Agent.PKT (2), Win32/Agent.WPI (4), Win32/AutoRun.Agent.OG, Win32/AutoRun.Agent.OH, Win32/AutoRun.Agent.OI, Win32/AutoRun.FakeAlert.AF (3), Win32/AutoRun.KS, Win32/AutoRun.VB.DQ, Win32/Boberog.AC, Win32/Dialer.NHP (2), Win32/Hupigon.NPB, Win32/Hupigon.NPC, Win32/Injector.PH, Win32/Injector.PI, Win32/IRCBot.ADZ (2), Win32/KeyLogger.BitLogic, Win32/NetPass (2), Win32/Obfuscated.NCY, Win32/Olmarik.HG (4), Win32/Poebot, Win32/Prosti.NCL (2), Win32/PSW.LdPinch.NJG, Win32/PSW.WOW.NKO (2), Win32/PSW.YahooPass.NAD (2), Win32/PSWTool.IEPassView.NAD, Win32/PSWTool.MailPassView.150, Win32/PSWTool.PassFox.111 (2), Win32/Rustock.NIH, Win32/Rustock.NIK, Win32/Sohanad.BM, Win32/Sohanad.NEJ, [...]

Bad Behavior has blocked 399 access attempts in the last 7 days.