Infosecurity News

  1. Nuisance Adware Torments Android Users

    Victims are forced to press on ads to answer or end calls, make a Wi-Fi connection, charge the phone or unlock the screen.

  2. Private Eyes, Fire and Fines: ICO Hands Down Record Damages

    A firm of loss adjusters has been fined £50K for using rogue private investigators to collect information illegally in insurance claim.

  3. White House Bans Personal Phones in West Wing

    Trump administration cites security concerns, but CISO role remains unfilled

  4. Microsoft Issues Warning for Meltdown Fix

    Out-of-band update could cause BSOD for some

  5. Fake Google Play Security Apps Harvest User Info

    Google takes down 36 malware-laden apps

  6. Android Trojan Targets 200+ Global Financial Apps

    Banker A2f8a is designed for stealing login credentials, hijacking SMS messages and more.

  7. Stealthy Crypto-Miners Are Slipping Into Web Ads

    The trojanized ads attempt to con site visitors into clicking on a pop-up that would initiate a secret mining process.

  8. Targeted Attacks on Industrial Sector Growing Rapidly

    About 28% of the 962 industrial companies surveyed have faced targeted attacks in the last 12 months.

  9. VMware Issues Critical VDP Update

    Virtualization giant fixes three vulnerabilities

  10. Major Chip Flaws Confirmed as “Meltdown” and “Spectre”

    Impact of discoveries could be felt for years, claim researchers

  11. DHS Admits Major Leak Affecting 247,000 Employees

    Unauthorized data exfiltration may have hit many more

  12. Android Malware Steals Uber Logins, Then Covers it Up

    Malware uses deep link URI of Uber app to appear legitimate

  13. Intel Flaw: Performance Degradation Bombshell or Massive Overstatement?

    The patches needed to fix the issue could grind the cloud, via AWS and Azure, to a halt, some say.

  14. LockPoS Takes a Page from Flokibot to Achieve Stealth

    The malware is distributed from the same botnet used to distribute the Flokibot PoS.

  15. Trackmageddon Lets Bad Actors Track Down Kids, Animals and More

    Rogue parties can access real-time location data on devices ranging from smart dog collars to in-car navigation to kid-trackers.

  16. Patching Takes More than a Fortnight for Many Firms

    Ivanti research finds security gaps persist on the endpoint

  17. Smart Speakers Could Expose Corporate Networks

    Trend Micro research identifies more IoT headaches for admins

  18. Iranian Netizens Flock to Tor After Web Crackdown

    Government blocks services as violent protests continue

  19. Ancestry.com Info Exposed by Leaky RootsWeb Server

    A file containing email addresses/username and password combinations for Ancestry.com, as well as user names, has been exposed.

  20. Huawei IoT Exploit Code Released for Free

    The working code for the Mirai variant has been made free on Pastebin.

What’s Hot on Infosecurity Magazine?