Blog Posts Tagged with "Email"
March 17, 2011 Added by:J. Oquendo
IP based authentication is somewhat helpful, but can be hurtful. While an administrator can define who can and cannot visit locations, servers, pages, this can become a cumbersome process. It also does little against a potential client side attack where an attacker accesses a trusted machine...
March 10, 2011 Added by:Headlines
The results of the poll indicate that a significant portion of those who are assumed to be more security conscious than most still retain a certain level of complacency when it comes to security best practices...
March 09, 2011 Added by:Headlines
Emails leaked in the HBGary Federal network breach reveal a spate of high level attacks targeting leading companies across multiple industries. The foreign-based attacks appear to be industrial espionage efforts intended to harvest sensitive trade secrets and intellectual property...
March 02, 2011 Added by:Headlines
What is quite interesting about the event is the revelation from Google that the data for Gmail is backed up on tapes. Yes, Google, which maintains some of the largest network storage systems in the world, backs up data on relatively antiquated tapes...
February 28, 2011 Added by:Headlines
More than a few Gmail users logged into their accounts this weekend to find that all of their email, chats, photos, and documents were no longer available. Many of the affected users were simply greeted with the Gmail "welcome" message as if their accounts were newly created...
February 04, 2011 Added by:Bill Gerneglia
By implementing DomainKeys Identified Mail (DKIM) at no additional cost to Google Apps users, the company says it is giving email senders a way to validate who they are in a manner that spam filters recognize, therefore ensuring higher message delivery rates to recipients...
January 31, 2011 Added by:Brent Huston
Browsing the Internet is fun, entertaining, and often necessary. Web browsers are also a ripe playground for nefarious activity which means the more risky places you visit, the bigger the chance that you’ll face some sort of danger...
January 29, 2011 Added by:Headlines
When the smart card is inserted into a compromised PC, the hackers use the opportunity to attempt to access the server. When the system requests a digital token, the attackers redirect the request to the compromised PC, which provides the token and password stolen with the keylogger...
January 24, 2011 Added by:Headlines
"Website owners should declare if they store your passwords using strong hashing. This is a simple process and not any more expensive to implement, however unfortunately websites not using this method of cryptography is something we see all too often..."
January 17, 2011 Added by:Jon Stout
As the Federal Government grows larger and larger, the vulnerability to cyber attack of its agency systems grows geometrically. And, since the entire network of diverse agencies and users is becoming more integrated, multiple access points open the entire system to attack...
January 06, 2011 Added by:Headlines
An official with the National Police Agency said that decrypted hard drives seized from Google last year contained private emails and text messages harvested by their Street View survey vehicles. South Korean police said they plan to file criminal charges...
January 04, 2011 Added by:Headlines
A fake security update notification for Windows is spreading malware code that installs an auto-run worm on PCs. There may be other versions of the email circulating which may contain variances in the sender, subject line, file name and email text. The content of the email is as follows...
December 24, 2010 Added by:Robert Siciliano
Identity Thieves and Cybercriminals Take Advantage of the Holiday Season, Aiming to Steal Consumers’ Money, Identities and Financial Information. As cybercriminals begin to take advantage of the holiday season, be cautious....
December 17, 2010 Added by:Headlines
The exposure was due to security lapses at Silverpop System, a marketing company that handles member communications for deviantART. The companies stated that no passwords were accessed, and that the biggest threat will be an influx of SPAM for the account holders exposed...
December 15, 2010 Added by:Bozidar Spirovski
Steganography is still considered to be a part of the obscure tools of secret agents and corporate spies. But the science of counter-steganography is also advancing, and it is quite probable that such analysis will find their way in filter systems, like mail and web filters...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013