Websense Security Labs Blog

Websense Security Labs discovers, investigates and reports on advanced Internet threats that traditional security
research methods miss.

Latest Blog Posts

View all posts > 

(November 2011) Posts

Working on the Holidays

Posted: 29 Nov 2011 08:00 PM | MarkHaffenden | no comments

While the United States enjoyed a long Thanksgiving weekend, hackers continued to battle Web security. Fortunately, the automated Websense® ThreatSeeker® Network and staff elsewhere in the world ensured that systems and data stayed safe. Websense researchers working over the holidays identified...


DeepSec 2011

Posted: 24 Nov 2011 01:43 AM | Hermes Li |

The DeepSec IDSC is an annual European two-day in-depth conference on computer, network, and application security. DeepSec IDSC 2011 was held on November 17th and 18th 2011 at the Imperial Riding School, Vienna. Hermes Li, security researcher at Websense Security Labs™, was speaking on Friday November...



Posted: 21 Nov 2011 11:00 PM | Amy Steier | no comments

This is the message behind the latest Droid Razr commercials. The initial teaser, launched just prior to the 11/11 release, shows a leather-clad motorcycle rider on a dramatic high-speed chase to capture the latest Droid. This explosive, precision-timed heist is worthy of a Mission Impossible movie scene...


Ultimate 5 TOP Malicious Spam Subjects

Posted: 17 Nov 2011 11:42 PM | Anonymous |

Websense® ThreatSeeker® Network detects millions of spam/malicious email campaigns on a daily basis. Such campaigns are sent in a short period of time, and then disappear for a while. Usually, campaigns will last for about one hour or less, therefore some companies might struggle with blocking...


2012 Cyber Security Predictions from the Websense Security Labs

Posted: 17 Nov 2011 09:33 AM | Patrik Runald | no comments

With all of the crazy 2011 security breaches, exploits and notorious hacks, what can we expect for 2012? Last year’s Websense Security Labs predictions were very accurate , so these predictions should provide very useful guidance for security professionals. Here are the highlights; the full report...


Websense at Pacsec 2011 and AVAR 2011

Posted: 15 Nov 2011 06:56 PM | uwang | no comments

Last week, some members from the Websense Security Labs™ had a busy week because they attended the Pacsec 2011 and AVAR 2011 conferences.

The Pacsec 2011 conference was held in Tokyo, and addresses the increasing importance of information security in Japan. Many well-known figures in the international security industry got together with leading Japanese researchers to share best practices and technology.

The AVAR 2011 conference was held in Hong Kong, and has a reputation in the Asia Pacific IT industry as being the leading industry conference on anti malware technologies and threats. This conference is not relevant only for virus researchers, but also for corporate IT professionals who have a business and technical need to secure their system, and for those who wish to have a safe and secure computing environment and be protected against Internet threats.



Websense 2011 predictions score A-, 2012 predictions coming soon…

Posted: 15 Nov 2011 04:00 AM | Patrik Runald | no comments

About a year ago we predicted what the biggest security risks would be in 2011 and as we're coming up towards the end of the year we wanted to see how accurate these predictions were. We have rated our 2011 predictions on a scale of A-F. Here we go! 1. The Stuxnet sequels are coming While there wasn’t...


Did you know ... about the dangers of online drug shopping?

Posted: 09 Nov 2011 09:00 PM | RM | no comments

Increases in prescription prices and lower insurance benefits have prompted many to look for bargain drugs on the Internet. There are legitimate pharmacies online, but as the highly qualified nurse below suggests, there are obvious dangers. And many dangers that are not so obvious. Websites that offer...


CVE-2011-3402 Vulnerability in TrueType Font Parsing

Posted: 07 Nov 2011 02:14 PM | Patrik Runald | no comments

When Duqu , which most believed to be written by the same group that wrote Stuxnet, was originally uncovered, the infection vector was still unknown; how did the machines get compromised in the first place? That changed when the Hungarian research lab, CrySys , announced that it had found the dropper...

Read more >