Infosecurity News

  1. FlawedAmmyy RAT Takes Over Desktops

    The RAT creates opportunities for actors to steal customer data, proprietary information and more.

  2. Mobile Ad Trojans Evolve to Maximize Profits

    With root privileges, they can secretly install various applications or bombard an infected device with ads to make use of the smartphone impossible.

  3. Experts: UK Gov’s IoT Security Guidelines Must Go Further

    Security industry wants more than voluntary guidelines

  4. Two-Thirds of IT Leaders Consider Consumer-Grade Access to Workplace Cloud Services

    Nine in 10 IT decision makers think ineffective cloud access management creates issues for the business

  5. Dark Web Experts: ID Fraudsters Unaffected by Police Efforts

    AlphaBay/Hansa takedown has forced scammers to be more creative, says Terbium Labs

  6. New Record 1.7Tbps DDoS Also Abused Memcached Servers

    Experts urge organizations to correct insecurely configured systems

  7. Kaspersky Lab Adds $100K Payout to Bug Bounty Program

    The new top-end award will be for the discovery and responsible disclosure of severe vulnerabilities in some of the firm’s flagship products.

  8. Gozi Trojan Turns to Dark Cloud Botnet

    The campaigns are relatively low volume and targeted to specific organizations, with some of the mails even being localized.

  9. Poor User Practice at the Root of Most Medical Device Security Risks

    Use of unauthorized applications (22%) and browsers (18%) are the leading security risks.

  10. Applebee’s Hit by POS Malware

    Over 160 US restaurants in RMH franchise are affected

  11. Non-Profit Aims to Bring More Military Vets into Cyber Roles

    TechVets could help reduce chronic skills shortages

  12. Crypto-Mining Attacks Jump 50% to Net Hackers Millions in 2017

    Kaspersky Lab claims attackers are using increasingly sophisticated tactics

  13. NIS America Suffers Card Breach, Offers Store Credit

    The attack resulted in the theft of payment-card details and address information.

  14. Malware Authors Turn to DNS Protocol as a Covert Channel

    DNS command and control (C&C) and DNS exfiltration can be successful because DNS is an integral part of the internet's infrastructure.

  15. It Could Happen to Anyone: FS-ISAC Falls for a Phish

    The financial industry's forum for collaboration on critical security threats was compromised with an unsophisticated phish.

  16. #GartnerIAM: Common Privilege Pitfalls Are Easily Overcome

    There has never been a greater need for PAM

  17. #GartnerIAM: IAM Disrupted by New Trends

    IAM is being disrupted by new trends, but they need not be a problem for the business

  18. Breaches on the Rise as 70% of Healthcare Firms Are Hit

    Thales eSecurity claims 39% have been breached in the past year alone

  19. SEC Issues Subpoenas to Crypto-Currency Firms

    US regulator getting serious about nascent industry

  20. NCSC Warns Charities of Cyber-Threats

    GCHQ body releases new guidance for third sector

What’s Hot on Infosecurity Magazine?