Infosecurity News Features

  1. BlackHat 2014: Incident Response Best Practice & Automation Key to Success - Bruce Schneier

    Network breaches are inevitable. It’s what happens next that really matters, said renowned cryptographic expert Bruce Schneier during the Black Hat security conference.

    1. Photo of Fahmida  Y. Rashid

      Fahmida Y. Rashid

      Reporter, Infosecurity Magazine

  2. The Perfect Target

    As the extraordinary Target breach narrative continues to unravel, Drew Amorosi investigates exactly who and what is to blame

  3. Tales of the Cyber Underground: A Hacker's Life Inside

    In the latest Tales of the Cyber Underground instalment, Tom Brewster ponders the effect that jail time has on convicted hackers, and talks to cybercriminals who have served prison sentences about their experiences.

    1. Tom Brewster

      Contributing Writer

  4. The Hype and the Hurt: Bitcoin’s Incredible Boom

    The ups and downs of the cryptocurrency market have made headlines – and not all of them good ones. Tom Brewster takes a look at both sides of the digital coin

    1. Tom Brewster

      Contributing Writer

  5. Tales of the Cyber Underground: LessPay, Cybercriminals’ Hot New Virtual Currency?

    Law enforcement agencies across the world are obsessed with virtual currencies, be it Bitcoin, Litecoin or Dogecoin. This was made apparent on a recent trip to Europol’s European Cyber Crime Centre (EC3) in The Hague.

  6. Tales of the Cyber Underground: The Case of the Stoned Cat (When Android Malware Gone Wrong)

    In the latest instalment of the 'Tales of the Cyber Underground' series, Tom Brewster looks into a piece of Android malware selling for thousands on the forums, but appears to have succumbed to an early demise...

  7. Hacker Training 101

    How do White Hats and Black Hats learn their trade? And are pen testing tools like Metasploit more useful for attackers or defenders? Drew Amorosi attends a master hacking class to find out…

  8. Tales of the Cyber Underground: Getting Shot at in a Java Drive-by

    In the latest installment of the 'Tales of the Cyber Underground' series, Tom Brewster uncovers a spat between an ex-blackhat and a crook using Java exploits to infect machines...

  9. The Hack Back Controversy

    An increasing amount of lip service is being paid to ‘hack back’ initiatives. While rules and levels of acceptance vary according to hack back entity – military, law enforcement and private industry – Kevin Townsend finds that perhaps the largest variance of opinion comes down to geography as he asks the question: Should hack back be a legal right for those under cyber-attack?

  10. Tales of the Cyber Underground: Cyber Crooks are Comin’ to Town

    As gamers get excited about Christmas, so do the crooks hoping to exploit them. In the latest instalment of the Infosecurity ‘Tales of the Cyber Underground’ series, Tom Brewster looks at how cheap and easy it is to acquire access to illegal games through underground services...

  11. The Underground Bitcoin Malware Boom

    As Bitcoin hits new highs, heists and individual robberies are becoming disturbingly common. In the second of the Infosecurity ‘Tales of the Cyber Underground’ series, Tom Brewster investigates the underground market for Bitcoin stealers and miners as crooks seek to exploit the rise of the crypto-currency.

  12. Boost A Botnet With Tor Bulletproofing For Just $500

    In the first of the Infosecurity ‘Tales of the Cyber Underground’ series, Tom Brewster investigates the growing trend of using Tor to encrypt botnet traffic and evade network monitors for as little as $500

  13. Meeting the IT Security Challenge

    How do you secure a business network? Experts debate whether to focus on keeping devices free of malware or to find ways to protect data despite infected devices

  14. Arab Uprising: Information Security in the Middle East

    The Middle East is an emerging market for information security and related awareness. With Israel already at the forefront of the industry, Wendy M. Grossman examines what the rest of the region is doing to catch up

  15. An Inside Look at AT&T’s Operations Center, and its Security Strategy

    One of the largest network services providers in the US invited Infosecurity to its Global Network Operations Center in Bedminster, New Jersey, and then explained why it is poised for success within the IT security market.

  16. Get Up on the Download: A Timeline of Kim Dotcom and Mega

    The start of 2013 witnessed the resurrection of besieged file sharing site MegaUpload. Drew Amorosi lays out a timeline of the service’s rebirth and the legal troubles of its embattled founder, Kim Dotcom

  17. Data Breach Scoreboard

    Infosecurity compiles history’s top data breaches, while surveying the mandatory reporting landscape in the US and Western Europe

  18. The Infosec Vendor’s Guide to the Facebook Overhaul

    Using examples from several IT security firms, Joe Dysart outlines how to successfully steer through Facebook’s facelift

  19. You Dirty, Shady RAT

    The latest APT to come to light is what McAfee has dubbed ‘Shady RAT’. But the folks at Kaspersky have voiced some objections. Drew Amorosi examines the threat…and the controversy

  20. RSA: Life After Breach

    With the RSA security breach still fresh in the minds of information security practitioners across the world, you’d be forgiven for assuming that the heyday for token-based ID is long gone. Stephen Pritchard investigates the advantages and disadvantages of token-based ID and finds out why, for now at least, it’s here to stay

What’s hot on Infosecurity Magazine?