Infosecurity News

  1. For online piracy, 'three strikes' works, says HADOPI

    HADOPI says ‘three strikes’ laws work; but they don’t increase entertainment industry profits points out TorrentFreak. Can piracy actually increase legal sales?

  2. Global Payments cops to 1.5 million total on credit card breach

    Global Payments, a third-party payment card processor, has admitted that around 1.5 million credit card numbers may have been stolen in a massive data breach last month, up significantly from the original report of 50,000.

  3. NAC market expected to surge over the next few years, predicts Frost and Sullivan

    The market for network access control (NAC) products is expected to grow at a 13.8% compound annual growth rate, reaching $312 million by 2016, predicts Frost and Sullivan.

  4. California child services loses storage devices with info on 800,000 people

    Computer storage devices containing personal information on 800,000 California residents were lost following a disaster recovery exercise held by IBM and Iron Mountain on behalf of the California Department of Child Support Services (DCSS).

  5. Multiple flaws identified in industrial control products

    Researchers Terry McCorkle and Billy Rios have identified a number of vulnerabilities in the Invensys Wonderware Information Server that could enable a denial-of-service attack, information disclosure, remote code execution, or session credential hijacking, warned the US Industrial Control Systems Cyber Emergency Response Team (ICS-CERT).

  6. China tops list of IP infringing countries, says White House

    China is the number one source of infringing products seized at the US border, according to an annual White House intellectual property (IP) enforcement report to Congress.

  7. CCTV increasingly accepted by UK public

    A new survey commissioned by D-Link shows that the UK, already the world’s most surveilled nation, is increasingly attracted to the use of CCTV.

  8. Imperva analyzes LulzSec’s attack tool

    In its latest Hacker Intelligence Initiative report, Imperva analyzes remote and local file inclusion (RFI/LFI) attacks as favored by LulzSec.

  9. GCHQ to get real-time access to personal traffic data

    The EC Data Retention Directive is already in force in the UK as a Statutory Instrument – The Data Retention (EC Directive) Regulations 2009. A proposed new bill will now force ISPs and telecommunications providers to make this data available to law enforcement in real time.

  10. Financial malware proliferation prompts banks to take action

    As variants of Zeus and other financial malware proliferate, the risk of online banking account takeover is growing and the need for banks to take action is growing as well.

  11. Payment processor suffers data breach that exposes 50,000 credit card numbers

    Global Payments, an Atlanta-based credit and debit card processor for banks and merchants, has suffered a security breach that has exposed information on at least 50,000 cardholders, the Wall Street Journal reported.

  12. House lawmakers introduce FISMA overhaul legislation

    House lawmakers have introduced a bill to overhaul the Federal Information Security Management Act (FISMA), which governs security for IT systems of the US federal government.

  13. Serious cybersecurity lapses found at Pacific Northwest electricity supplier

    The Department of Energy (DOE) has identified serious cybersecurity gaps at the Bonneville Power Administration, which supplies wholesale electric power to regional utilities in the Pacific Northwest.

  14. Google ships Chrome 18 with nine security fixes

    Google has issued yet another version of Chrome, number 18 if you are still counting, which fixes nine security flaws and beefs up graphics.

  15. Blackhole: the 1-day exploit kit

    ESET has reported on the latest version of the Blackhole exploit kit, noting that it has been updated to include a recent Java vulnerability.

  16. Our expert is better than your expert, says Hotfile to Warner Bros

    Hotfile is being sued by Warner Bros (and others) – the MPAA – for copyright infringement; Hotfile is countersuing for bogus copyright infringement claims.

  17. Yahoo commits to honoring Do-Not-Track

    Do-Not-Track (DNT) is the evolving standard that will provide internet users with greater control over their privacy on the internet. “Yahoo websites worldwide will comply with visitors’ Do-Not-Track preferences starting later this year,” said the company on Wednesday.

  18. Mediyes trojan underscores need for proper key management

    The discovery of the Mediyes trojan using a valid digital signature has raised concerns about the need for proper key management, noted John Grimm with Thales e-Security.

  19. Weaponized MS Word files targeting Macs

    Weaponized Word files targeting Macs have been identified by AlienVault Labs, which says the malware is coming from the same Chinese group that has been targeting the Tibetan government and nongovernmental organizations.

  20. Close to half of SpyEye banking trojan domains located in US

    Close to half of the domains and hosts for the SpyEye banking trojan are located in the US, according to research by South Korea’s AhnLab.

What’s hot on Infosecurity Magazine?