- 4 General Methods You Can Use To Detect #Phishing Attacks http://t.co/6TlBy2Um #li 00:45:20, 2011-12-18
- Visa looks into Eastern European #security breach http://t.co/xD1zBnlZ #pcidss #li 00:47:21, 2011-12-18
- How to avoid #malware hiding behind #QR codes http://t.co/tqm3OKdH #li 00:50:28, 2011-12-18
- ArMyZ security issues weekly roundup | 17-12-2011 – http://t.co/u35zogLv 01:53:28, 2011-12-18
- China-based hacking creates cyber cold war http://t.co/1nTSrck6 #li 23:49:55, 2011-12-18
- Buona lettura – Securing Apache, Part 2: #XSS Injections – LINUX For You http://t.co/5CvCmyTn #li 23:58:55, 2011-12-18
- Solita raccomandazione del periodo dell'anno: attenzione ai #malware legati alle mail di presunti auguri di #natale #awareness #li 23:24:29, 2011-12-19
- Twitter will open source security software from its Whisper Systems acquisition http://t.co/56ZFQbu8 22:13:51, 2011-12-20
- Data Loss Prevention – Step 3: Engage Physical Security http://t.co/vQgLWn56 #dlp #li 22:16:32, 2011-12-20
- Stolen Credit Cards Go for $3.50 at Online Bazaar http://t.co/IW63gcRl #cybercrime #cyberlaundering #li 22:18:10, 2011-12-20
- First EU report on maritime cyber security http://t.co/rLcnCmoR 22:19:31, 2011-12-20
- No more passwords in five years, IBM predicts http://t.co/Uq4lXRrJ #security #biometric #li 22:21:35, 2011-12-20
- Improving Security in the Cloud http://t.co/OMdsztPM #li 22:24:14, 2011-12-20
- Chinese hackers breached U.S. Chamber of Commerce, report says http://t.co/tAogZSZv #li 21:49:27, 2011-12-21
- Zero Day #Vulnerability Found in Windows 7 http://t.co/ukVf63B1 #poc #li 21:51:53, 2011-12-21
- Analyzing Passwords for Patterns and Complexity http://t.co/PAOfwGPG #li 21:53:08, 2011-12-21
- ENISA Report on Maritime Cyber #Security http://t.co/XjRJJJ3p #li 21:54:02, 2011-12-21
- CryptDB – Secure Data #Encryption For #SQL Databases http://t.co/f2TJNiLR #li 21:55:58, 2011-12-21
- Hackers Completely Penetrated U.S. Chamber of Commerce's IT Systems http://t.co/llKDgXHs #li 22:01:31, 2011-12-21
- The 5 Most Common Tactics Used To Hack Passwords http://t.co/W36j09nE #li 22:03:19, 2011-12-21
- #Malware for Christmas http://t.co/immssy1O #li 22:04:51, 2011-12-21
- Account Activity Notification with attached ZIP file contains a trojan http://t.co/y9AYz0QG #trojan #li 22:06:21, 2011-12-21
- #Scammers use browser extensions to hijack Facebook accounts http://t.co/xcp25cl8 #li 22:07:15, 2011-12-21
- SSL's Future http://t.co/M1q58FI1 #li 21:15:04, 2011-12-22
- Application Security Tools http://t.co/eUxmonnf #li #tls #ssl 21:52:11, 2011-12-24
- Stormy Seas Ahead: Top 5 #Malware Threats in 2012 http://t.co/wYcRrI4W #li 21:53:34, 2011-12-24
- Cross-Site Request… Framing? http://t.co/204W1zva #li 21:57:10, 2011-12-24
- 10 Vulnerable web applications for #security #testing http://t.co/nt1dlzwg #li #coding #secure #webapp 22:00:29, 2011-12-24
- Impostor Apps in the Android Market – F-Secure Weblog : News from the Lab http://t.co/PiLQvCuA #li 22:02:14, 2011-12-24
- Top 10 Cybersecurity Trends for Banks http://t.co/hZCbyI4I #li 22:04:07, 2011-12-24
- Good reading – How to implement a successful security and disaster recovery plan http://t.co/DUKKH36Z #li 22:05:35, 2011-12-24