Infosecurity News

  1. Ramdo Click Fraud is Resurgent, with Ties to Kelihos Botnet

    Takedown-resistant click-fraud spike is expected to continue.

  2. Thai Army Patrols the Web For Anti-Monarchy Slurs

    Lese majeste laws are a post-coup priority for new junta.

  3. Dominos Pizza Customers Exposed After Massive Data Breach

    Hackers claim to have stolen sensitive information from over 600,000 European customers.

  4. Britain’s Top Code Breakers Announced as Cyber Security Challenge Schools Champs

    Cabinet Office co-sponsors pioneering program to find best country’s best young coders

  5. Watch Out For Sneaky Cyber Attacks, M&A Firms Warned

    FireEye claims attackers are out to compromise businesses involved in acquisitions for IP gain or access to sensitive info on the deal.

  6. Cyber-challenge for Kids Slated for DEF CON

    Kids as young as five are invited to test their social engineering skills.

  7. Mobile Trojan Svpeng Implements Ransomware

    The Android-targeting banking bug is morphing rapidly.

  8. Plan Now For Europe’s NIS Cyber Security Directive, Firms Warned

    Experts urge EEMA conference attendees to get ready, even though requirements are vague.

  9. TweetDeck Taken Offline After XSS Flaw Hits Users

    Problems seem to have stemmed from a 19-year-old Austrian who wanted to tweet a heart symbol.

  10. Zeus Used to Mastermind DDoS and Attacks on Cloud Apps

    Prolexic warns that infamous crimeware kit is being customized for use in variety of scenarios.

  11. ICS-CERT: Federal Highway Signs Are Easily Hackable

    Expect DUI warnings to be replaced with zombie alerts.

  12. In Snowden’s Wake, Calls for Balkanized Internet Present more Harm than Good

    Drew Amorosi recently caught up with Steve Durbin at Infosecurity Europe in London, where the ISF’s global VP took a skeptical view on political leaders who have called for regional control of the internet in the aftermath of NSA surveillance disclosures.

  13. Wily ‘Clandestine Fox’ Changes Attack Tools and Vectors to Snare Victims

    FireEye warns group which exploited XP zero day is now using new malware and social media to trick employees.

  14. Smart TVs Represent a Massive and Vulnerable Attack Surface

    As connected TVs become mainstream, a flaw in the HbbTV standard threatens widespread chaos.

  15. Second Chinese PLA Hacking Unit Unmasked in ‘Putter Panda’ Report

    CrowdStrike intelligence alleges Unit 61486 hacked satellite firms since at least 2007

  16. Scammers Trick Thousands of Twitter Users with ‘Follower’ Bait

    The Twitterverse falls for the promise of more followers.

  17. Malvertising and Cryptowall Mark the Appearance of the RIG Exploit Kit

    Since first appearing in April, RIG traffic volume continues to rise

  18. IEEE CEO Loeb Named ISACA CEO

    Former IEEE chief will bring a focus on expanding the central strategic role of the cybersecurity function.

  19. DARPA Announces First Teams and DEF CON Colocation for Cyber Grand Challenge

    The two-year competition to develop self-healing security is well on its way.

  20. How to Integrate Security into Core Business Processes

    The Information Security Forum explains how the CISO can play a key role in central business strategy.

What’s Hot on Infosecurity Magazine?