Infosecurity News Features

  1. Boost A Botnet With Tor Bulletproofing For Just $500

    In the first of the Infosecurity ‘Tales of the Cyber Underground’ series, Tom Brewster investigates the growing trend of using Tor to encrypt botnet traffic and evade network monitors for as little as $500

  2. Meeting the IT Security Challenge

    How do you secure a business network? Experts debate whether to focus on keeping devices free of malware or to find ways to protect data despite infected devices

  3. Arab Uprising: Information Security in the Middle East

    The Middle East is an emerging market for information security and related awareness. With Israel already at the forefront of the industry, Wendy M. Grossman examines what the rest of the region is doing to catch up

  4. An Inside Look at AT&T’s Operations Center, and its Security Strategy

    One of the largest network services providers in the US invited Infosecurity to its Global Network Operations Center in Bedminster, New Jersey, and then explained why it is poised for success within the IT security market.

  5. Get Up on the Download: A Timeline of Kim Dotcom and Mega

    The start of 2013 witnessed the resurrection of besieged file sharing site MegaUpload. Drew Amorosi lays out a timeline of the service’s rebirth and the legal troubles of its embattled founder, Kim Dotcom

  6. Data Breach Scoreboard

    Infosecurity compiles history’s top data breaches, while surveying the mandatory reporting landscape in the US and Western Europe

  7. The Infosec Vendor’s Guide to the Facebook Overhaul

    Using examples from several IT security firms, Joe Dysart outlines how to successfully steer through Facebook’s facelift

  8. You Dirty, Shady RAT

    The latest APT to come to light is what McAfee has dubbed ‘Shady RAT’. But the folks at Kaspersky have voiced some objections. Drew Amorosi examines the threat…and the controversy

  9. RSA: Life After Breach

    With the RSA security breach still fresh in the minds of information security practitioners across the world, you’d be forgiven for assuming that the heyday for token-based ID is long gone. Stephen Pritchard investigates the advantages and disadvantages of token-based ID and finds out why, for now at least, it’s here to stay

  10. Data Breach Spring

    Infosecurity’s Drew Amorosi examines three data breach incidents from the past few months that, by their nature, keep security vendors in business, regulators busy, and CISOs up at night. Find out why industry observers think this rash of massive breaches could lead to a ‘PCI for consumer privacy’

  11. News Feature: Time to Avoid the Droid?

    Finally, hype has matched reality in the world of mobile security. Drew Amorosi chronicles the recent ups and downs of the bustling Android Market to find out why it is in the crosshairs of the security industry

  12. News Feature: WikiLeaks ‘Cablegate’ Dominates Headlines

    Drew Amorosi recounts the events surrounding WikiLeaks’ publication of thousands of confidential US diplomatic cables that recently garnered so much international attention, and takes a look at the political fallout.

What’s Hot on Infosecurity Magazine?