Infosecurity News

  1. IT Admins Often Turn off DPI and Other Firewall Features

    Despite the recent data breach tsunami, admins are still sacrificing security for performance.

  2. Thousands of SMBs Targeted in Malicious Redirect Campaign

    A large, coordinated malware effort is taking advantage of lax security at Mom-and-Pop businesses.

  3. Cyber Thursday in Europe as 29 Countries Take Part in Exercises

    Enisa-led CyberEurope exercise features 400 IT security professionals

  4. Pizza Hut Fans Targeted in Latest Asprox Spam Campaign

    Hungry netizens get more than they bargain for

  5. Brazilian Fraudsters Hit US Banks with Fake EMV Card Transactions

    A rash of attacks show that chip-and-PIN cards aren't as safe as banks thought.

  6. Samsung Android Phones in Remote Lock Shock

    NIST warns of serious flaw which could allow a hacker to remotely lock handsets

  7. Tor Node Red-Flagged for Slinging Malware

    Researchers spot Russian exit node modifying binaries via MITM patching

  8. Hackers Hit the White House

    What appears to be a recon mission points out that a breach on such a high-profile target is inevitable.

  9. Sandworm Vector Used for New, 'Dyre' Consequences

    A variant of the Dyreza/Dyre banking trojan malware is mounting a fresh offensive on the financial sector, witha new twist.

  10. London Authorities Nab Suspect in $2.6Mn ATM Heist

    An eastern European organized crime gang is believed to have hit 51 ATMs over the May Day holiday.

  11. DDoS Preparedness: More Than a Firewall

    DDoS attacks are becoming more common, increasingly sophisticated and more costly--but most businesses have no idea how to prepare.

  12. Chinese Espionage Group Directed a 6-Year, Widescale Offensive

    The Axiom group victimized pro-democracy non-governmental organizations (NGO) with hundreds of thousands of infections.

  13. FireEye Unmasks Kremlin-Sponsored Cyber-Gang APT28

    Group has operated for seven years stealing defense and geopolitical intelligence

  14. ICS-CERT Three Year BlackEnergy Attack on Industrial Control Systems

    Asset owners and operators urged to audit industrial systems immediately

  15. FBI Raids Home of Suspected Second Whistleblower

    Snowden #2 is believed to have passed on documents about a US terror watch list

  16. BYOD Security Incident Costs Exceed $250,000

    Check Point report says personal device use is soaring, and so are breaches

  17. Anti-Government Surveillance Think Tank Code Red Announced

    Schneier, Diffie and Privacy International founder Simon Davies are all on board

  18. Hackers Used Online Video Site to Smuggle Data Out of Firm

    Skyhigh Networks spots unusual activity at victim organization

  19. Canada Mulls Mandatory Data Breach Notifications

    Fines for non-compliance would reach $100,000.

  20. EWF USA 2014: Best Practice and Playbooks for Incident Response

    In an interactive panel titled ‘Cyber Risk: This is not your father’s playbook’ at EWF USA 2014, Leigh Honeywell, security engineer at Heroku, and Carolyn Munoz, senior business security officer at ADP, took to the stage to discuss best practice for incident response, from both a technical and business perspective.

What’s Hot on Infosecurity Magazine?