Your Ad Here

Thursday, December 3, 2009

Metasploit, NeXpose Integrate for Enterprise Security Testing

eSecurity Planet


Thursday December 3, 2009

Metasploit, NeXpose Integrate for Enterprise Security Testing
By Sean Michael Kerner - December 2, 2009
Rapid 7 is now integrating popular open source exploit framework into a more enterprise-friendly suite for vulnerability scanning.

Group Finds Privacy Holes in Digital Health Records
By Kenneth Corbin - December 2, 2009
Patient Privacy Rights group issues report card showing wide variations in privacy safeguards in electronic health offerings.

Facebook Revamps Privacy Approach Yet Again
By Kenneth Corbin - December 2, 2009
Social networking leader moves away from network-based approach to privacy, gives users more precise control over what's shared.

McAfee Locks Down Removable Devices
By Larry Barrett - December 1, 2009
Security software-maker serves up unified, end-to-end security options for the enterprise.

Bug Confirmed in Older IE Browsers
By Stuart J. Johnston - November 25, 2009
Microsoft confirmed that a security hole in older versions of Internet Explorer is a real threat that the company is taking seriously.

2009's Malware May Reveal 2010's Threats
By Sean Michael Kerner - November 23, 2009
In 2009, new malware mechanisms have emerged and platforms beyond Windows have increasingly been targeted.

12/3: W32.SillyFDC.BBX Spreads to Removable and Mapped Drives
By eSecurityPlanet Staff - December 3, 2009
This worm spreads by copying itself to removable and mapped drives.

Get Ready for Windows 7!
Pros and Cons? Learn What Our Experts Think
Download Free eBook Now. Click Here.
Interested in placing your TEXT AD HERE? Click Here
 
12/3: Adware Installs as Browser Search Plugin
By eSecurityPlanet Staff - December 3, 2009
Adware.Zwunzi is an adware program that installs itself as a Browser Search Plugin for Internet Explorer and Mozilla Firefox.

12/3: FakeAV-BY Associated with Rogue Security Software
By eSecurityPlanet Staff - December 3, 2009
FakeAV-BY is malware with attributes associated with rogue security software.

12/3: Agent-LWY Steals Confidential Information
By eSecurityPlanet Staff - December 3, 2009
Agent-LWY is a Trojan for the Windows platform. Troj/Agent-LWY includes functionality to: run automatically, steal confidential information, and access the Internet and communicate with a remote server via HTTP.

12/2: Trojan.Vundo!gen2 Heuristic Detection
By eSecurityPlanet Staff - December 2, 2009
This heuristic detection includes members of the Trojan.Vundo family.

12/2: EncPk-MC Malicious Executable
By eSecurityPlanet Staff - December 2, 2009
Mal/EncPk-MC is a malicious executable, often in the FakeAV family of malware.

12/02: Voterai-A Attacks Through Removable Storage Devices
By eSecurityPlanet Staff - December 2, 2009
The Voterai-A virus spreads by copying itself to removable storage devices.

12/2: Trojan.FakeAV!gen9 Trojan Utilizes Packers
By eSecurityPlanet Staff - December 2, 2009
This relatively low-threat Trojan is a heuristic detection for files that may have been obfuscated or encrypted in order to conceal themselves from antivirus software. It targets only Windows OS, from Windows 95 on up.

12/1: AntivirusSystemPro Reports False or Exaggerated Threats
By eSecurityPlanet Staff - December 1, 2009
The misleading application may prevent a user from running any other executable, claiming that it is infected and asking the user to register the misleading application.






The Network for Technology Professionals

Search:

About Internet.com

Legal Notices, Licensing, Permissions, Privacy Policy.
Advertise | Newsletters | E-mail Offers

All newsletters are sent from the domain "internet.com." Please use this domain name when configuring e-mail or spam filter rules, if you use them.

No comments:

Post a Comment

statcounter