Infosecurity News

Staples Calls the Cops After Potential Card Fraud Incident

Staples Calls the Cops After Potential Card Fraud Incident

Retail chain could be latest to be hit as 2014 breach saga continues

Surging DDoS Amplifications Use Millions of Connected Devices

Surging DDoS Amplifications Use Millions of Connected Devices

4.1 million Internet-facing UPnP devices are vulnerable to being employed in massive reflection DDoS attacks.

Operation DeathClick Targets US Defense Sector

Operation DeathClick Targets US Defense Sector

Micro-targeted malvertising via real-time bidding engines elude most security approaches.

75% Of UK Online Population at Cyber-Risk

75% Of UK Online Population at Cyber-Risk

UK government says that poor password practices run rampant in an increasingly online world.

Hacker Halted 2014: The Fog of War can Cloud both Physical and Digital Battlefields

Hacker Halted 2014: The Fog of War can Cloud both Physical and Digital Battlefields

At the Hacker Halted conference in Atlanta, Carl W. Herberger, vice president of security at Radware, discussed Thursday the importance of cutting through that fog as organizations try to defend their environments.

Hacker Halted 2014: Zombies As Scary as a Successful Browser Hack

Hacker Halted 2014: Zombies As Scary as a Successful Browser Hack

At the Hacker Halted conference in Atlanta, security researchers Xiaoran Wang and Angelo Prado demonstrated on Thursday some weaknesses in the major browsers in use today.

Anonymous App Whisper Hits Back at Privacy Claims

Anonymous App Whisper Hits Back at Privacy Claims

CEO admits ‘we’re not infallible’

Will the Right to be Forgotten Censor the Internet?

Will the Right to be Forgotten Censor the Internet?

Following the European ruling that means search engines have to take down links to embarrassing stories, has the right to be forgotten put us on a slippery slope to censorship?

China Accused of Launching MITM Attacks Against iCloud

China Accused of Launching MITM Attacks Against iCloud

Beijing wants access to local Apple users’ data, says Greafire.org

Sandworm Team Went After Firms Running SCADA

Sandworm Team Went After Firms Running SCADA

Researchers link C&C servers to attacks on CIMPLICITY HMI software

McAfee: Government and Public Must Share Security Burden

McAfee: Government and Public Must Share Security Burden

Vendor says next-gen government services will require security to be treated as a public health issue

What’s Hot on Infosecurity Magazine?