Here's the recent articles submitted by eccuni
Articles By eccuni
New Trojan Attracts Attention Of Information Security Experts
Submitted as: Peter Martin
Criminals may use the Trojan to gain access to personal data on mobile phones and redirect them to remote servers. Security researchers consider Geinimi as first Android malware, which has botnet-like features.(read
entire article)
View : 354 Times
Category : Computers
Christmas Card Steals Sensitive Information. Information Security Experts Fear Cyber Espionage
Submitted as: Peter Martin
Recently,information security professionals identified data breach by cybercriminals.The offenders reportedly sent e-mails to government employees and contracted professionals.(read
entire article)
View : 339 Times
Category : Computers
U.s Busts Vietnam Based Cybercrime Ring. Information Security Awareness May Reduce Crime
Submitted as: Peter Martin
Cybercriminals have not only become more organized, but also are expanding their networks worldwide. Wider network helps offenders to evolve sophisticated crime mechanisms and avoid detection by law enforcement authorities.(read
entire article)
View : 322 Times
Category : Computers
Kenyan Websites Face Cyber-attacks. Information Security Experts May Improve Website Security
Submitted as: Peter Martin
Over the last two Kenya made major strides in its efforts to expand internet connectivity in the country by gaining access to fibre optic cable.(read
entire article)
View : 359 Times
Category : Computers
Isu Internet Security Researchers Combat Cyber-attacks
Submitted as: Peter Martin
The surge in cyber-attacks over the last year, use of cyber weapon such as Stuxnet on industrial installations and leakage of classified documents by WikiLeaks has made it inevitable for Internet security researchers to find new ways to deal with the challenges in the cyberspace.(read
entire article)
View : 338 Times
Category : Computers
Microsoft Issues Patch For Vulnerabilities In Mdac And Windows Backup Manager
Submitted as: Peter Martin
Cybercrime is rising with each passing day and hackers are relentless in their pursuit to exploit vulnerabilities.(read
entire article)
View : 364 Times
Category : Computers
New Computer Forensics Lab In California To Deal With Internet Crime
Submitted as: Peter Martin
Many countries across the world do not have a mechanism to deal with the growing number of cybercrime incidents.(read
entire article)
View : 330 Times
Category : Computers
Seacoast Radiology Notifies Customers After Security Breach
Submitted as: Peter Martin
It is not uncommon for attackers to target websites, servers, computer systems and network to acquire control, gain unauthorized access, breach sensitive data or install malicious software.(read
entire article)
View : 372 Times
Category : Computers
Use Of Sms Tokens For Validating Third Party Payments Make Mobile Phones Vulnerable To Attacks
Submitted as: Peter Martin
Increasing number of banks are adopting the practice to send authentication tokens through short message service (SMS) to their customers for validating third party payments.(read
entire article)
View : 373 Times
Category : Computers
Enisa Reviews Data Breach Notification Rules To Understand Concerns Of Telecom Companies
Submitted as: Peter Martin
The recent years have witnessed steady increase in data breach incidents.(read
entire article)
View : 362 Times
Category : Computers

