Infosecurity News

  1. FireEye: Over a Quarter of Attacks Bypassing Filters are APTs

    Organizations in multiple sectors compromised in new tests

  2. Malvertising Campaign Affects 1.8 Billion

    Huffington Post, Yahoo News, AOL, TMZ and many others are affected by the infection, which makes use of the legitimate AOL ad network.

  3. FBI: Sony Hacker IP Addresses Used ‘Exclusively’ By North Korea

    Attackers got sloppy and revealed their true location, Comey claims

  4. Chinese Police Buy Mobile Trojan to Spy on Locals

    Wenzhou PSB blunder reveals $24,000 purchase

  5. Bitstamp Hackers Steal $5 Million in Bitcoins

    Operational wallets compromised as crypto-currency suffers first blow of 2015

  6. Morgan Stanley Fires Employee After Data Leaked Online

    Insider breach suspected after Pastebin post offers client log-ins for cash

  7. Moonpig Flaw Leaves User Info Exposed for Over a Year

    Researcher told card maker about problem in August 2013

  8. Wifiphisher Cleverly Captures WPA Credentials

    The automated tool mounts a social engineering campaign and a man-in-the-middle attack to capture credentials.

  9. 'Muslim Hackers' Strike Little-Known Bus and Train Timetable Site

    Bristolians miffed by incongruous web defacement

  10. South Korea Plays Down Worm Infection at Nuke Plant

    USBs likely to have introduced “low risk” worm, says energy minister

  11. Google Slammed for Disclosing Windows 8.1 Flaw

    Project Zero’s strict 90-day deadline branded ‘irresponsible'

  12. Hackers Gain Admin Rights with Windows 8.1 Flaw

    An unpatched privilege escalation flaw in Windows 8.1 opens the door for network infiltration.

  13. WTF????? Steam Chat Spreads Malware

    The popular online gaming outlet has been infiltrated to push credential-stealing malware.

  14. China Blocks Gmail as Censorship Noose Tightens

    Activists urge tech giants to revoke certificates.

  15. FBI on the Hunt for Cyber Special Agents

    Feds want more tech experts in their crime-fighting ranks.

  16. Backoff POS Malware Vets Targets via Surveillance Cameras

    The people behind Backoff have been using surveillance cameras to verify that machines are in fact POS devices.

  17. Thunderstrike Mac Attack Achieves Persistence

    The attack makes use of the laptops’ physical Thunderbolt interface to achieve persistent boot rootkits.

  18. China Blamed for Operation Poisoned Helmand Attack on Afghan Sites

    War torn country sucked into Beijing’s South Asian strategy

  19. Anunak APT Gang Makes Off With $18 Million

    Russian cyber-criminals target internal banking systems

  20. (ISC)² Security Congress Opens Call for Speakers

    Hot topics will include cloud security and mobility—and the intersection between them.

What’s Hot on Infosecurity Magazine?