Infosecurity News

Iran Blamed for Destructive Cyber Blitz on Sands Casino

Iran Blamed for Destructive Cyber Blitz on Sands Casino

First attack of its kind on a US company, says director of national intelligence

Spyware Biz Gamma Slammed for Human Rights Failings

Spyware Biz Gamma Slammed for Human Rights Failings

OECD concludes two-year investigation with heavy criticism of British-German company

Mozilla Patches 17 Security Holes with Firefox 36

Mozilla Patches 17 Security Holes with Firefox 36

Browser maker addresses three critical issues

Behavioral Biometrics Target Mobile Payments Arena

Behavioral Biometrics Target Mobile Payments Arena

A new patent provides for a cognitive biometric signature which takes into account a range of combined physiological factors, such as left/right handedness, press-size, hand tremor and eye-hand coordination.

2014: Year of the Large-Scale Attack

2014: Year of the Large-Scale Attack

Trend Micro noted that many of the biggest issues of the year could have been prevented with better proactive awareness.

Gemalto Hits Back at NSA SIM Hack Claims

Gemalto Hits Back at NSA SIM Hack Claims

SIM card giant says it was attacked, but encryption keys weren’t stolen on a large scale

Lenovo Site Hacked in Aftermath of Superfish Scandal

Lenovo Site Hacked in Aftermath of Superfish Scandal

Lizard Squad claims it was behind embarrassing defacement

ICO Fines Insurance Firm £175k After Breach

ICO Fines Insurance Firm £175k After Breach

Privacy watchdog gets tough as hackers exploit IT security failings at Staysure

DDoS Attackers Leveraging Joomla Vulnerability

DDoS Attackers Leveraging Joomla Vulnerability

There are more than 150,000 potential Joomla reflectors on the Internet, Akamai said.

Kaspersky Tackles Critical Infrastructure with Embeddable System

Kaspersky Tackles Critical Infrastructure with Embeddable System

The Kaspersky Security System platform is a dedicated solution for systems like ERP, smart grids, the internet of things (IoT) and critical infrastructure.

APT Sophistication Outstripping Cyber-preparedness

APT Sophistication Outstripping Cyber-preparedness

Attackers are becoming smarter about hiding in the most complex parts of the operating system—as businesses are oblivious.

Kids' Android Tablets Leak Personal Info, Photos

Kids' Android Tablets Leak Personal Info, Photos

Bluebox found that all devices examined were susceptible to at least three vulnerabilities.