วันพุธที่ 29 พฤษภาคม พ.ศ. 2556

Chinese Hacking: How Much Hype?; How to Hack Twitter's Two-Factor Authentication; Danger Apps of the Week: and More

PC Magazine
  Security Watch May 29, 2013
 
View Online | Manage Subscription | Follow Us

TOP STORIES
Chinese Cyber Espionage: Don't Believe the Hype
The Washington Post published a shocking list of U.S. defense programs whose designs have reportedly been stolen by Chinese cyberattacks and ABC news said the plans for Australia's spy headquarters were also stolen by Chinese hackers. It makes China sound like a secret-sucking cyber espionage machine, but is that really the case?

Share This:

How to Hack Twitter's Two-Factor Authentication
We've pointed out some problems with Twitter's new two-factor authentication. However, security experts indicate that the problem is worse than that, a lot worse.

Share This:

Twitter's Two-Factor Authentication Can't Stop Account Hijackings
Twitter is finally addressing thorny problem of account hijackings by rolling out two-factor authentication for all users. While a necessary first step, this is not sufficient to foil all the hijackers.

Share This:

Malware-splosion: 2013 Will be Malware's Biggest Year Ever
According to the German security company AV-Test, malware has exploded in the past five years to unprecedented levels. More troublingly, they anticipate seeing over 60 million new pieces of malicious software by the end of the year.

Share This:

Iranian Cyber-Attackers Target US Energy Companies
Cyber-attackers backed by the Iranian government have breached and infiltrated several US-based energy companies in an ongoing campaign, according to the Wall Street Journal.

Share This:

Zeus Trojan Makes a Comeback After Months of Silence
The Zeus banking Trojan is back, with new code and capabilities, Trend Micro researchers said recently.

Share This:

Malware, Adware in This Week's Dangerous Android Apps
Bad Android apps can take many forms. Whether they are out to steal data, sign you up for premium rate SMS services, or pushing dodgy and malicious links via advertiser networks, users need to beware. SecurityWatch is partnering with a handful of security companies who monitor apps on Google Play and third-party marketplaces to identify malicious apps you should avoid.

Share This:

Questions, comments, tips about potential viruses, worms, vulnerabilities? Send them here:

FEATURED OFFERS



PCMag Editor's Choice AWARD-WINNING TECH
now on sale!

iOlo System Mechanic 11  |  Utilities
MSRP: $49.99 |  $24.95

Dell Inspiron 17-3721  |  Laptops
MSRP: $499.99 |  $499.99 + Free Shipping 

Cyberlink PowerDirector  |  Video Editing
MSRP: $99.99 |  $79.99

Klipsch Image X7i  |  Headphones
MSRP: $199.99 |  $199 + Free Shipping 

SOS Online Backup  |  Utilities
MSRP: $119.88 |  $99.99

Dell UltraSharp U3014  |  Monitors
MSRP: $1499.99 |  $1499.99 + Free Shipping 

Webroot SecureAnywhere Antivirus  |  Security
MSRP: $39.99 |  $19.99


eNewsletter Information
You are subscribed to PCMag.com's Security Watch with the email address pctipworld@gmail.com. Click here to unsubscribe from this newsletter.

To subscribe to other e-mail newsletters from Ziff Davis, change your delivery format from HTML to text, or change your email address, click here.



Copyright ©2013 Ziff Davis, Inc.  All Rights Reserved.
Ziff Davis, Inc., 28 East 28th Street, 11th Floor, New York, NY 10016

ไม่มีความคิดเห็น:

แสดงความคิดเห็น

 

Blogger news

Blogroll

NosLia Blog - Computer IT

About