Search This Blog

Saturday, January 29, 2011

IBM predicts cyberattacks targeting critical infrastructure in 2011‏

 IBM predicts critical infrastructure attacks in 2011
 Robert Westervelt, News Director

Big Blue anticipates organizations struggling to manage smartphone security and predicts that critical infrastructure will be among the top targets of cybercriminals in 2011.

 Google Android Trojan surfaces in China
Security Bytes blog
The newly discovered Geinimi Trojan infects users of Android smartphones by embedding itself in mobile applications downloaded from third-party services.

Android enterprise security: Mobile phone data protection advice


Cybersecurity 2010: Looking back and lessons learned - Part 2
Security Squad podcast
The editorial team continues its discussion on some of the top IT security news stories of 2010 such as Microsoft's legal action against Waledac botnet, the McAfee DAT File issue and more.

Cybersecurity 2010: Looking back and lessons learned - Part 1

Stop Web Attacks

Follow these free how-to tips and improve your security capabilities:
Performing a security risk analysis to assess acceptable level of risk
 Email, website and IP spoofing: How to prevent a spoofing attack
How to detect rogue DHCP servers, routers and NICs on a network
 Fake antivirus pop-up scams: Forming a security awareness training plan
How to detect and prevent keylogger attack


No comments: