Attackers could remotely exploit flaws in Siemens industrial control system app
Four vulnerabilities in the Siemens Automation License Manager (ALM) application could be exploited remotely, resulting in denial of service, write to memory, file corruption, or remote code execution for industrial control systems.
Hackers to exploit vulnerable infrastructure in 2012, McAfee warns
Attackers will increasingly leverage the lack of cybersecurity preparedness of utilities and other critical infrastructure in 2012, predicts McAfee Labs.
Personal information on 90 million Chinese online subscribers hacked
Hackers have recently posted online personal information of around 90 million subscribers to a Chinese online forum and microblogging sites.
India's Paladion to set up cybercrime monitoring hub in Oman
Indian information security firm Paladion Networks has announced plans to set up a dedicated hub in Oman to monitor and respond to cybercrime in the sultanate.
Buffer overflow vulnerability identified in Sielco Sistemi SCADA system
The US Department of Homeland Security (DHS) is warning about a buffer overflow vulnerability in the Sielco Sistemi Winlog application used to control industrial systems.
Malaysia needs indigenous security software talent, says researcher
Malaysia needs to develop indigenous information security software expertise to reduce its dependence on foreign-produced software that may pose security risks, according to a computer science researcher.
Scrooge phishing attacks launched against Apple users on Christmas
Phishing attacks were launched on Christmas Day against Apple customers, directing users to update their billing information or risk “account termination.”
ENISA examines economic dimensions of information security
The European Network and Information Security Agency (ENISA) has published a report examining the economic drivers and barriers to information security.
Siemens to plug SCADA holes early next year
Siemens expects to issue a patch in January to fix security holes in its supervisory control and data acquisition (SCADA) products that control industrial automation systems.
Lax mobile network security exposes conversations to hackers, says researcher
Mobile phone users in Europe and other parts of the world are vulnerable to having their conversations, text messaging, and voice mail hacked because of poor mobile network security, according to German security researcher Karsten Nohl.
Stratfor cautions data breach victims about possible retaliation
US security analysis firm Stratfor is warning victims of a data breach that they may be the target of retaliation by hacktivists if they speak out publicly.
Malware blocking – not sandboxing – key to browser security, says Imperva
The browser’s ability to block socially engineered malware, not sandboxing technology, is the most important criteria to judge browser security, argues Rob Rachwald, director of security strategy at data security firm Imperva.