Infosecurity News

  1. Black Hat 2014 Keynote: What InfoSec Needs to Do

    Security visionary Dan Geer laid out recommendations and observations for the information security industry in his keynote speech for the Black Hat security conference on Wednesday.

  2. Google’s Gmail Scanning Leads to Arrest of Convicted Child Sex Offender

    Web giant claims it doesn’t scan for any other signs of illegal activity.

  3. Fake MH17 Video Page Leads to Bloatware

    The scam leads users to a minefield of potentially unwanted programs.

  4. Poweliks Malware Hides in Registry to Evade AV Tools

    Traditional security will not find this new threat, experts warn.

  5. IcoScript RAT Hides Behind Yahoo! Email Addresses

    The malware went undetected for years thanks to clever camouflage.

  6. BlackHat USA 2014: Multi-factor Authentication Tackles BYOD Complexity

    Authentify offers prioritization for biometrics and other authentication mechanisms.

  7. Israeli Spies Tapped John Kerry’s Phone Calls – Report

    Intelligence services eavesdropped on secretary of state during key peace talks, according to a German report.

  8. GCHQ Announces First Master’s Degree Courses in Infosecurity

    First milestone for government plan to improve higher education options and close skills gaps.

  9. Mozilla Fesses up to Accidental Data Breach

    Firefox developer exposed personal details of 76,000 users of its Developer Network

  10. Citadel Evolves to Boost Persistency

    The banking trojan has added use of remote desktop to evade security software.

  11. Fiesta Exploit Kit Starts Delivering a Double Payload

    Malware authors are looking for more bang for the buck.

  12. Backoff PoS Malware is Crafty and Dangerous, US-CERT Warns

    The card-scraping bug have been undetectable by AV systems so far.

  13. Twitter Government Access Requests Jump 50%

    Washington wants to know more about micro-blogging users than any other government, according to latest Transparency Report.

  14. Russia Demands Apple and SAP Hand Over Source Code

    Kremlin wants tech giants to prove they’re not a conduit for NSA spying.

  15. Internet of Things Laid Bare: 25 Security Flaws Per Device

    HP researchers discover 70% of the most common devices have vulnerabilities.

  16. Crippling DDoS Hits Major Aussie Broadband Provider

    Cirrus Communications had half of its network taken down by attack earlier this week.

  17. Chinese Hackers Use APTs to Target Gaming Companies

    TG-3279 group wants to play games for free or re-use source code in competing products, says Dell

  18. Cloud Security Alliance Develops Assessment Spec for Third Parties

    The STAR Attestation is aimed at CPA assessments.

  19. DDoS-ers Launch Attacks From Amazon EC2

    Cybercriminals exploit vulnerability in Elasticsearch software to infiltrate cloud instances.

  20. Nation-E Readies Cybersecurity Center for Critical Infrastructure

    The focus will be on training and disaster preparedness.

What’s Hot on Infosecurity Magazine?