Infosecurity News Features

Information Security Industry Shellshocked: Why Did Bash Catch Us by Surprise?

Information Security Industry Shellshocked: Why Did Bash Catch Us by Surprise?

Last week the information security world was rocked yet again by a major vulnerability in a little known piece of software that could have severe ramifications on the security of large swathes of the internet.

BlackHat 2014: Businesses Look to NIST Risk Management Framework in Bid to Improve Security Posture

BlackHat 2014: Businesses Look to NIST Risk Management Framework in Bid to Improve Security Posture

The recently released Risk Management Framework from the National Institute for Standards and Technology outlines what organizations need to do to improve their information security posture against serious attacks.

BlackHat 2014: Incident Response Best Practice & Automation Key to Success - Bruce Schneier

BlackHat 2014: Incident Response Best Practice & Automation Key to Success - Bruce Schneier

Network breaches are inevitable. It’s what happens next that really matters, said renowned cryptographic expert Bruce Schneier during the Black Hat security conference.

The Perfect Target

The Perfect Target

As the extraordinary Target breach narrative continues to unravel, Drew Amorosi investigates exactly who and what is to blame

Tales of the Cyber Underground: A Hacker's Life Inside

Tales of the Cyber Underground: A Hacker's Life Inside

In the latest Tales of the Cyber Underground instalment, Tom Brewster ponders the effect that jail time has on convicted hackers, and talks to cybercriminals who have served prison sentences about their experiences.

The Hype and the Hurt: Bitcoin’s Incredible Boom

The Hype and the Hurt: Bitcoin’s Incredible Boom

The ups and downs of the cryptocurrency market have made headlines – and not all of them good ones. Tom Brewster takes a look at both sides of the digital coin

Tales of the Cyber Underground: LessPay, Cybercriminals’ Hot New Virtual Currency?

Tales of the Cyber Underground: LessPay, Cybercriminals’ Hot New Virtual Currency?

Law enforcement agencies across the world are obsessed with virtual currencies, be it Bitcoin, Litecoin or Dogecoin. This was made apparent on a recent trip to Europol’s European Cyber Crime Centre (EC3) in The Hague.

Tales of the Cyber Underground: The Case of the Stoned Cat (When Android Malware Gone Wrong)

Tales of the Cyber Underground: The Case of the Stoned Cat (When Android Malware Gone Wrong)

In the latest instalment of the 'Tales of the Cyber Underground' series, Tom Brewster looks into a piece of Android malware selling for thousands on the forums, but appears to have succumbed to an early demise...

Hacker Training 101

Hacker Training 101

How do White Hats and Black Hats learn their trade? And are pen testing tools like Metasploit more useful for attackers or defenders? Drew Amorosi attends a master hacking class to find out…

Tales of the Cyber Underground: Getting Shot at in a Java Drive-by

Tales of the Cyber Underground: Getting Shot at in a Java Drive-by

In the latest installment of the 'Tales of the Cyber Underground' series, Tom Brewster uncovers a spat between an ex-blackhat and a crook using Java exploits to infect machines...

The Hack Back Controversy

The Hack Back Controversy

An increasing amount of lip service is being paid to ‘hack back’ initiatives. While rules and levels of acceptance vary according to hack back entity – military, law enforcement and private industry – Kevin Townsend finds that perhaps the largest variance of opinion comes down to geography as he asks the question: Should hack back be a legal right for those under cyber-attack?

Tales of the Cyber Underground: Cyber Crooks are Comin’ to Town

Tales of the Cyber Underground: Cyber Crooks are Comin’ to Town

As gamers get excited about Christmas, so do the crooks hoping to exploit them. In the latest instalment of the Infosecurity ‘Tales of the Cyber Underground’ series, Tom Brewster looks at how cheap and easy it is to acquire access to illegal games through underground services...

What’s Hot on Infosecurity Magazine?