Infosecurity News

  1. ISF Launches Info-risk Assessment Methodology

    IRAM2 is meant to help businesses identify, analyze and treat information risk throughout the organization.

  2. US Military in Online Privacy Warning After ISIS Death Threats

    Hacktivists post names and addresses of 100 personnel

  3. US Joins with EU, Japan Against China's Vendor Source Code Plan

    China is going through with a plan to force tech vendors to fork over source codes and use Chinese encryption.

  4. VaultCrypt, the Russian Ransomware with a Focus on Customer Service

    As it migrates to English-speaking regions, VaultCrypt's use of a sophisticated payment site and unusual ransom method sets it apart.

  5. NYPD Cop Arrested for Hacking the FBI, Traffic Databases in Elaborate Scam

    Katz used cyber-spying to prey on those looking to sue for personal injury after traffic accidents.

  6. DDoS Blitz Hits Anti-Chinese Censorship Body

    Greatfire.org appeals for help to manage 2500 times increase in traffic

  7. TrapX Names FireEye Exec as CEO

    Gregory Enriquez plans to focus on defense-in-depth for the data-breach era.

  8. Facebook Adds Payments Feature

    As the social network joins the payments fray, it's clear that the system is exciting and useful to everyone—including criminals.

  9. Premera Blue Cross Healthcare Breach Affects 11 Million

    Hackers accessed information to commit financial and medical fraud, and get potentially sensitive information about medical conditions.

  10. Silk Road Successor Evolution Disappears From Dark Web

    Drugs marketplace goes offline as rumors swirl of exit scam

  11. (ISC)2 Joins Institute for Critical Infrastructure Technology

    As a new fellow, (ISC)2 contributed to the latest briefing to members of the Congressional Cybersecurity Caucus.

  12. RSA Appoints Elastica, Cisco Vet Ramzan as CTO

    Ramzan has a deep background in machine learning and cloud security.

  13. Kilim Facebook Worm Promises Explicit Pics

    Gullible users are actually infected with trojan

  14. BlackBerry ‘Fesses to FREAK Fail

    Encrypted comms firm releases long list of affected software

  15. IBM: Billions of Records of Personally Identifiable Info Leaked in 2014

    The main culprit is a rise in unpatched and designer vulnerabilities: more than 9,200 new flaws in Q4 alone.

  16. FunCaptcha Takes on the Bots

    FunCaptcha replaces these standard tests with interactive, quick mini-games to more accurately detect real humans and stump bots in what its creators say is less than 10 seconds.

  17. CryptoLocker Variant Targets 20+ Online Games

    The TeslaCrypt ransomware is taking aim at a virtual who’s who of online gaming, from Call of Duty, to Skyrim to Minecraft.

  18. Digital Transformation Ends in Breaches For 40% of UK Public Sector

    Iron Mountain claims lack of experienced staff is hindering best practice efforts

  19. Twitter Bans Revenge Porn

    Campaigners welcome social network’s decision after UK court ban

  20. UK Competition Pits Contestants Against ‘Cyber-Terrorist’ Threat

    The final of the Cyber Security Challenge UK 2015 is well underway, with 42 contestants taking part in a simulated real-life cyber-terrorism incident

What’s Hot on Infosecurity Magazine?