Infosecurity News
Companies leap to new web and mobile technologies leaving security behind
Companies are embracing new web and mobile technologies such as cloud computing, virtualisation, social networking and mobile communication at a faster rate than their information security strategies are updated.
Lawmakers seek to revamp REAL ID
Lawmakers in the US have introduced a bill that they hope will fix what they see as flaws in the controversial 2005 REAL ID act. The new bill introduces checks and balances to protect consumer privacy, according to congressional leaders and privacy watchdogs.
£200m from digital TV fund earmarked for univesal broadband plan
The government could use £200m left over from a fund to pay for the switch from analogue to digital TV broadcasting to help pay for the roll-out of universal broadband.
PBX hacking moves into the professional domain as arrests stack up
PBX hacking - the act of cracking into a company PBX and selling long distance/international telephone time to third parties at a discount - is alive and well, despite several years of being out of the news.
Learn about document security
LockLizard investigates the best approaches to document security depending on what clients want to achieve, in its white paper Document Security - a Guide to Securing Your Documents.
DDoS attacks on Belarusian media – is cyber warfare escalating?
There has been a surge in distributed denial of service (DDoS) attacks against media sites in Belarus, something that could signal an escalation in cyber warfare in the region.
Symantec and McAfee under fire for auto-renewing subscriptions
The perils of giving companies your payment card details and failing to realise the likelihood of those details being used when subscription renewal times comes around have raised their ugly head again, with Symantec and McAfee being ordered to pay $375,000 each to the New York Attorney General to resolve complaints about the issue from customers.
Indian authorities taking no chances with cybercafe users
The anonymity of cybercafe users in India is being severely curtailed, in a bid to stamp out illegal, fraudulent and terrorist usage of this popular method of gaining internet access.
Aussie bank customers hit by advanced phishing techniques
Customers of the Commonwealth Bank in Australia are being targeted by a new breed of phishers, who seem intent on scamming them out of their e-banking and payment card details.
Unencrypted laptop with 109 000 records on pension schemes members stolen
An unencrypted laptop containing details on 109 000 pension schemes members with UK pension funds service provider, The Pensions Trust, has been stolen from a third-party office in Marlow, Buckinghamshire.
Guide to handling personal data launched by BCS and ISAF
The British Computer Society (BCS) has linked up with the Information Security Awareness Forum (ISAF) to launch a professional code of best practice when handling personal data.
ENISA evaluates network resilience of MPLS, IPv6 and DNSSEC
The European Network and Information Security Agency (ENISA) has released two reports on how and if Multi Protocol Label Switching (MPLS), Internet Protocol version 6 (IPv6) and Domain Name System Security Extensions (DNSSEC) could improve the resilience of communication networks.
Twitter worm steals user details
A worm on Twitter is tricking users into giving up their user details at the same time as redirecting victims to a dating website where the aggregate number of views result in affiliate revenue.
Google indexes details on thousands of credit and debit cardholders
Police in Victoria, Australia are investigating a potentially major security incident in which the stolen personal details of thousands of credit and debit card holders from Australia, Germany and the UK were posted to a blogging site and auto-indexed into the Google search engine.
RAF data loss included sensitive vetting data
The Ministry of Defence (MoD) has omitted information that the theft of hard drives in September 2008 with data on RAF personnel also included highly sensitive RAF vetting records.
Open Group advises on risk management methods
Independent consortium the Open Group is trying to resolve what it sees as confusion about risk management in the industry by publishing a guide to choosing a risk management methodology.
Jericho Forum links with Cloud Security Alliance
Hard on the heels of unveiling Cloud Cube, its four-dimensional best practice model for cloud computing security in April, security industry association the Jericho Forum has linked with the Cloud Security Alliance (CSA), a not-for-profit vendor group.
Anti-malware groups align themselves
Anti-malware efforts took a significant step forward this week with the announcement of an initiative to try and bring legitimate software businesses together and lock out malware writers.
Survey shows information security awareness is high, yet compliance is low
SAI Global’s Benchmarking Survey 2008 finds that 95% of employees believe information security is important, but that there is a lack of knowledge and training surrounding how to identify and report incidents.
£3.9 million bank credit error highlights need for code auditing
A succession of errors - at the programme code development level and human error when inputting the data - are reported to have resulted in a New Zealand couple being credited with NZ$10 million (£3.9 million) rather than a much smaller sum as the proceeds of a bank credit line.



