Sort Blog Posts

Sort Posts by:

  • in
    from   

Suggest a Blog

Enter a Blog's Feed URL below and click Submit:

Most Commented Posts

In the past 7 days

Recent Posts

(from The Price of Trust)

Recent Comments

Recently Viewed

JacketFlap Sponsors

Spread the word about books.
Put this Widget on your blog!
  • Powered by JacketFlap.com

Are you a book Publisher?
Learn about Widgets now!

Advertise on JacketFlap

MyJacketFlap Blogs

  • Login or Register for free to create your own customized page of blog posts from your favorite blogs. You can also add blogs by clicking the "Add to MyJacketFlap" links next to the blog name in each post.

Blog Posts by Tag

In the past 7 days

Blog Posts by Date

Click days in this calendar to see posts by day or month
<<August 2025>>
SuMoTuWeThFrSa
     0102
03040506070809
10111213141516
17181920212223
24252627282930
31      
new posts in all blogs
Viewing Post from: The Price of Trust
Visit This Blog | More Posts from this Blog | Login to Add to MyJacketFlap
This is the journey of a new author and her new Christian romance novel.
1. Links for 2012-09-16 [del.icio.us]

  • Saudi- Aramco continues to investigate cyber attack - Middle East North Africa Financial Network - MENAFN
    (MENAFN - Arab News) Saudi Aramco continues to investigate the malicious virus that attacked the oil giant's computer network on Aug. 15. The investigation of this incident is still ongoing, the company said in a statement to the media yesterday. Referring to news reports in some sections of the international and local media regarding the findings of the investigation, Saudi Aramco said We want to emphasize that these reports are not based on real facts.
  • 7.4billion rogue trader: Trial told of City worker's gamble in UK's biggest banking fraud
  • MasterCard announces new EMV liability shift deadline for ATMs
  • Reversal of fortune: Attempts to disguise file names
    Social engineering tactics are vast and varied, and we see all sorts of methods being used on a daily basis by malware authors, in their attempts to compromise your machine. One such method that we see often is malware being distributed as an alluring or enticing link or file, and we know that some users (that are perhaps not as cautious as they should be) might click on such links, open such file, or accept file transfers from unknown sources… As has been noted previously, the use of Unicode characters such as the Right to Left Override (U+202E) to alter the appearance of a file name, in an attempt to trick the user into clicking on that file, is not new. But that doesn't mean that this method is not used much; actually, we see this happening regularly.
  • Java zero-day leads to Internet Explorer zero-day | ZDNet
    While looking around a compromised server that was being used to exploit Java vulnerabilities, a security researcher stumbled upon another exploit that he claims affects fully patched versions of Microsoft Internet Explorer 7 and 8. Eric Romang found four files on the server: an executable, a Flash Player movie and two HTML files called exploit.html and protect.html When users visit the exploit.html page, it loads the Flash movie, which in turn loads the other HTML page, protect.html. Together, they help drop the executable on to the victim's computer. At this point, attackers have everything they need to drop whatever applications they like on the victim's machine, whether it is to join a botnet or conduct attacks. In this case, the dropper executable installs another program when the victim next logs in.

0 Comments on Links for 2012-09-16 [del.icio.us] as of 1/1/1900
Add a Comment