Your Ad Here

Wednesday, December 2, 2009

Facebook Revamps Privacy Approach Yet Again

eSecurity Planet


Wednesday December 2, 2009

Facebook Revamps Privacy Approach Yet Again
By Kenneth Corbin - December 2, 2009
Social networking leader moves away from network-based approach to privacy, gives users more precise control over what's shared.

12/02: Voterai-A Attacks Through Removable Storage Devices
By eSecurityPlanet Staff - December 2, 2009
The Voterai-A virus spreads by copying itself to removable storage devices.

12/2: Trojan.FakeAV!gen9 Trojan Utilizes Packers
By eSecurityPlanet Staff - December 2, 2009
This relatively low-threat Trojan is a heuristic detection for files that may have been obfuscated or encrypted in order to conceal themselves from antivirus software. It targets only Windows OS, from Windows 95 on up.

McAfee Locks Down Removable Devices
By Larry Barrett - December 1, 2009
Security software-maker serves up unified, end-to-end security options for the enterprise.

12/1: AntivirusSystemPro Reports False or Exaggerated Threats
By eSecurityPlanet Staff - December 1, 2009
The misleading application may prevent a user from running any other executable, claiming that it is infected and asking the user to register the misleading application.

11/30: Packed.Generic.271 Targets Encrypted Files
November 30, 2009
Packed.Generic.271 is a heuristic detection for files that may have been obfuscated or encrypted in order to conceal them from antivirus software.

11/25: Bloodhound.Exploit.286 is Heuristic Detection
November 25, 2009
Bloodhound.Exploit.286 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer 'Style' Object Remote Code Execution Vulnerability.

Bug Confirmed in Older IE Browsers
By Stuart J. Johnston - November 25, 2009
Microsoft confirmed that a security hole in older versions of Internet Explorer is a real threat that the company is taking seriously.

Get Ready for Windows 7!
Pros and Cons? Learn What Our Experts Think
Download Free eBook Now. Click Here.
Interested in placing your TEXT AD HERE? Click Here
 
11/24: Suspicious.Stealers Detects Without Sigs
November 24, 2009
Suspicious.Stealers is a detection technology designed to detect entirely new malware threats without traditional signatures. This technology is aimed at detecting malicious software that has been intentionally mutated or morphed by attackers.

2009's Malware May Reveal 2010's Threats
By Sean Michael Kerner - November 23, 2009
In 2009, new malware mechanisms have emerged and platforms beyond Windows have increasingly been targeted.






The Network for Technology Professionals

Search:

About Internet.com

Legal Notices, Licensing, Permissions, Privacy Policy.
Advertise | Newsletters | E-mail Offers

All newsletters are sent from the domain "internet.com." Please use this domain name when configuring e-mail or spam filter rules, if you use them.

No comments:

Post a Comment

statcounter