Infosecurity News

Magazine House Loses $1.5m in Email Scam
Hackers hijacked CEO’s account and emailed accounts payable staff

Time to Hang Up: Phone Fraud Soars 30%
Pindrop Security report claims ‘robodialers’ are driving spike in scam calls

Keyboard Vulnerability Leaves 600 Million Samsung Devices at Risk
The flaw can be exploited to allow a remote attacker to execute arbitrary code on the user's phone, including the Galaxy S6.

Privileged Users Pose Biggest Cyber-Risk to European Companies
In an Ovum survey, only 13% said that their organizations were not at all vulnerable to insider threats.

Standalone IPS Demand Shrinks but Market Still Racks Up $1.41bn in 2014
Frost & Sullivan notes IPS market consolidation

Operation Lotus Blossom Sets Sights on Asian Military
Long-running, state-sponsored campaign stole info from South China Sea nations

Cisco Set to Cull China Execs – Report
Recent sales slump could be due to Beijing’s security concerns

China Launches Watering Hole Attacks on Political Dissidents
China is said to be using a new watering hole attack technique to monitor political dissidents.

Connected Home Threatens Service Provider Data
Energy management, interactive home devices, connected appliances and real time security allows unprecedented access to a variety of service providers.

Bank of England Disables Auto-Complete After Email Blunder
Comms boss accidentally sent sensitive info to a journalist last month

Stegoloader Malware Hides in Images on Legit Sites
Dell SecureWorks warns of stealthy info-stealing malware family

Confusion, Lack of Visibility Plague Security Policy
Less than a third of all respondents, 32%, claim they have full visibility into their global network.

Microsoft Kills the Ask Toolbar
Microsoft security tools will automatically detect and remove almost all versions of the ubiquitous bar from PCs.

Snapchat Adds Two-Factor Authentication for Extra Safe Sexting
Popular messaging app in bid to improve security

Wikipedia to Switch on HTTPS to Counter Surveillance Threat
Encrypted traffic will help protect users from censors and spies, says Wikimedia Foundation

Most Security Depts Blindly Trust Certificates and Keys
Most IT security professionals don’t know how to detect or remediate quickly compromised cryptographic keys and digital certificates.

OpenSSL Patches Logjam Flaw to Foil NSA Snoopers
Update will reject handshakes with DH parameters shorter than 768 bits

Big Data Installs Spark Security Concerns
The primary data types managed in big data systems include personally identifiable information, payment card info and national security intelligence data.

Europol Busts Operation Triangle in Six-Nation Raid
Major international cyber-ring pilfered $6 million in a complex phishing-man-in-the-middle-malware-money laundering scheme.

Anderson Report: UK Snooper's Charter 'Unnecessary'
Britain’s electronic surveillance laws are “incomprehensible to all but a tiny band of initiates,” and wholly “without statutory safeguards.”



