Half Sized Blog Element (Single Author Style)
Half Sized Blog Element (Multi Author Style)
Apple’s own Macs bitten by Java-based malware attack
An article form naked Securty about malware on Mac: If you still think malware on a Mac is more myth than reality you may want to talk to the security engineers over in Cupertino at a rather prestigious fruit company. According to Reuters, “Apple Inc. was recently attacked by hackers who infected the Macintosh […]
Spearphishing: The dirty email trick favored by the nastiest hackers
Interesting article in NBC NEWS technology section: A new report says that the Chinese military is secretly obtaining sensitive data from U.S. companies. A key technique is “spearphishing,” an approach that tricks a targeted individual to reveal information that can be used to infiltrate the company or government agency that person works for. Security companies […]
Apple’s own Macs bitten by Java-based malware attack
An article form naked Securty about malware on Mac: If you still think malware on a Mac is more myth than reality you may want to talk to the security engineers over in Cupertino at a rather prestigious fruit company. According to Reuters, “Apple Inc. was recently attacked by hackers who infected the Macintosh […]
Spearphishing: The dirty email trick favored by the nastiest hackers
Interesting article in NBC NEWS technology section: A new report says that the Chinese military is secretly obtaining sensitive data from U.S. companies. A key technique is “spearphishing,” an approach that tricks a targeted individual to reveal information that can be used to infiltrate the company or government agency that person works for. Security companies […]
