Trend Micro has broadened its cloud-based security infrastructure so that its products can receive actionable threat intelligence that lets the security software act like a “virtual shield” against many web-based threats. View full post on Techworld.com security For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com View full…
Black Hat: Most Java malware exploits “type confusion” vulnerability
A researcher investigated Java exploits, and drew on one well-know example, to explain how one of the most common classes of attack spreads. View full post on Latest articles from SC Magazine News For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com View full post on National Cyber…
Cross-platform malware exploits Java to attack PCs and Macs
The same Java vulnerability used in the infamous Flashback malware is now being used as an attack vector for a single piece of malware that can infect both Windows and Mac OS X computers. View full post on malware – Yahoo! News Search Results View full post on National Cyber…
Researchers Release New Exploits to Hijack Critical Infrastructure
New attack code that can be used to take over the control systems of refineries, power plants and factories has been released into the wild. The purpose? To push vendors to take security seriously. View full post on computer worm – Yahoo! News Search Results View full post on National…
Mac malware exploits unpatched drive-by Java vulnerability
Malware striking Mac computers is making the headlines again, this time exploiting a drive-by vulnerability in Java that has left Apple users dangerously exposed to attack. The new Mac malware exploits a Java vulnerability (known as CVE-2012-0507), that Apple users are still not patched against. Apple users won’t feel any…
Google Offers $1 Million in Hacker Bounties for Exploits Against Chrome
It may be hard out there for a pimp, but it just got a little bit more lucrative for a hacker. Google announced on Monday that it would pay $1 million in cash awards to anyone who can hack its Chrome browser during its Pwnium security challenge next week in…
Trojan Exploits Known Hole in Microsoft Office (February 9, 2012)
Wow! It’s an incident handler’s Christmas morning, tools, tools, tools. Very Applicable! -Todd Davis, Symantec Article source: http://www.sans.org/newsletters/newsbites/newsbites.php?vol=14&issue=13&rss=Y#sID309 View full post on National Cyber Security
2012-01-30 – SANS Mentor Program partners with Lorain County Community College to offer Hacker Techniques, Exploits and Incident Handling courses
SANS Mentor Program partners with Lorain County Community College to offer Hacker Techniques, Exploits and Incident Handling courses View full post on SANS Press Room View full post on National Cyber Security » Announcements
2012-01-27 – SANS Mentor Program partners with Lorain County Community College to offer Hacker Techniques, Exploits and Incident Handling courses
SANS Mentor Program partners with Lorain County Community College to offer Hacker Techniques, Exploits and Incident Handling courses View full post on SANS Press Room View full post on National Cyber Security
Android app malware exploits Carrier IQ controversy
Phony Android application checks for running Carrier IQ software, but then sends SMS messages to a premium rate number. <img alt="Android app malware exploits Carrier IQ controversy, Blog, malware, Android, exploits, controversy, Carrier"height="0" width="0" border="0" style="display:none" src="http://segment-pixel.invitemedia.com/pixel?code=TechBiz &partnerID=167&key=segment”/> View full post on SearchSecurity: Security Wire Daily News View full post…