iTunes Scam: How to Protect Yourself |
- iTunes Scam: How to Protect Yourself
- Privacy Watch: Privacy and Location in Apple's iOS 4
- Microsoft Binary Planting Bug: What You Need to Know
- Rustock botnet responsible for 40 percent of spam
- Worried About ID Theft? Join the Club
- Rustock botnet ditches encryption to ramp spam
- Foursquare Privacy Basics: 5 Tips to 'Secure' Your Check-Ins
- Malicious Spam Exploits Fake Celebrity Deaths
- Hackers bait Zeus botnet trap with dead celeb tales
- Free tool from Team Cymru aims to help fight malware
- Registry operator Afilias embraces DNS security
- Newest E-mail Scams: Could They Fool You?
iTunes Scam: How to Protect Yourself Posted: 24 Aug 2010 09:00 AM PDT In recent weeks, more and more iTunes users have been reporting fraudulent activity on their Apple accounts, reporting hundreds or even thousands of dollars worth of bogus purchases. With the reports of this type of fraud on the uptick in recent weeks, many users have been quick to blame Apple or PayPal, as many of the affected iTunes accounts were linked to PayPal accounts. |
Privacy Watch: Privacy and Location in Apple's iOS 4 Posted: 24 Aug 2010 09:00 AM PDT |
Microsoft Binary Planting Bug: What You Need to Know Posted: 24 Aug 2010 09:00 AM PDT Microsoft released a security advisory in response to a potential exploit, known as DLL preloading or binary planting, which has been found to impact hundreds of third-party Windows applications--possibly including software developed by Microsoft itself. Unfortunately, this isn't a simple Windows vulnerability that Microsoft can fix with its next patch release, so it's important that you understand the flaw and what is at risk, as well as what you can do to protect your systems. |
Rustock botnet responsible for 40 percent of spam Posted: 24 Aug 2010 09:00 AM PDT |
Worried About ID Theft? Join the Club Posted: 24 Aug 2010 09:00 AM PDT |
Rustock botnet ditches encryption to ramp spam Posted: 24 Aug 2010 09:00 AM PDT |
Foursquare Privacy Basics: 5 Tips to 'Secure' Your Check-Ins Posted: 24 Aug 2010 09:00 AM PDT It's hardly practical to believe there are "right" and "wrong" ways to employ social networking services like Twitter or Facebook. However, there are "smart" and/or "safe" methods of use, especially for location-based services (LBS) that identify your whereabouts at a given time, like popular social network/LBS Foursquare. |
Malicious Spam Exploits Fake Celebrity Deaths Posted: 24 Aug 2010 09:00 AM PDT |
Hackers bait Zeus botnet trap with dead celeb tales Posted: 24 Aug 2010 09:00 AM PDT |
Free tool from Team Cymru aims to help fight malware Posted: 24 Aug 2010 09:00 AM PDT |
Registry operator Afilias embraces DNS security Posted: 23 Aug 2010 09:00 AM PDT |
Newest E-mail Scams: Could They Fool You? Posted: 23 Aug 2010 09:00 AM PDT |
You are subscribed to email updates from "Cisco" via ehsan in Google Reader To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment