Infosecurity News

Google Adds Encryption to SafeSearch
Organizations can require SafeSearch on their networks while at the same time ensuring that their users’ connections to Google remain encrypted.

Four Indicted for Hacking Xbox, Call of Duty and the US Army
Members of an international hacking ring are accused of stealing more than $100 million in intellectual property, including the Army's helicopter simulator software.

Staff Ready Shadow IT to Bypass Controls Ahead of EU Data Laws
Sophos report claims that almost two-thirds of office workers would circumvent corporate IT

New Mac Malware Uses Reddit to Communicate
Dr Web warns 17,000 Macs have been infected so far

Most Security Pros Expect APT Attack in Next Six Months
Awareness and confidence levels growing, but concerns persist

Intralinks Heads Off NSA Fears by Handing Crypto Keys to Customers
Any data access demands would have to come direct to individual firms

Shellshock Attacks Hit Major NAS Kit; IoT Next?
FireEye warns embedded Linux Internet of Things-type devices could be in firing line

Supervalu, Albertsons Hit With Second PoS Attack
Hackers, using different malware than for the first, more widespread incident, have taken aim at the grocery chain.

Millions of Machines Are Running Unpatched Java and IE
A new report reveals shocking numbers of unpatched systems and software.

Kaspersky Expands Partnership with INTERPOL, Europol
Information-sharing will continue to be critical as cybe-rcriminals extend their tactic of attacking from shadowy, virtual locations, with a target area of 2.7 billion people.

US Attorney General Slams Strong Phone Encryption
Holder claims it helps protect online criminals and child abusers

Porn Spammer Hacks Legit Sites to Sell Naked Celeb Pics
Hundreds of web servers have been compromised, says Cloudmark

(ISC)2 Congress 2014: Panel Make Recommendations for Improving Cybersecurity Workforce Competency
The (ISC)2 Foundation and University of Phoenix recently conducted a National Roundtable on Cybersecurity Workforce Competencies. At the (ISC)2 Congress, co-located with ASIS International, in Atlanta, a panel discussed the roundtable findings and the steps being taken by the educational institutions developing tomorrow’s cybersecurity talent.

Dragonfly/Havex Targeting Pharmaceutical Sector
While it's best-known for attacks on energy companies and use by Energetic Bear, Dragonfly malware is likely aimed at pharma companies.

Malicious Shellshock Traffic Invades the Web
Attackers actively scanning for vulnerable machines, says FireEye

Hundreds of US Stores Affected as POS Provider is Hacked
Customers of over 300 restaurants may have had their card details stolen after Signature Systems breach

US Banks Get Serious on Security Information Sharing
New JV Soltra will develop threat intelligence products to help in the cybercrime fight

Apple’s New iPhone 6 TouchID Hacked, as Usual
Researchers find little change from iPhone 5

BT: Confidence in the Cloud Hits Rock Bottom
Meanwhile, most organizations are moving to the cloud anyway, but many are choosing consumer products despite security risks.

Backlash: Half of Consumers Take Business Elsewhere Post-Breach
Most consumers hold executives directly responsible and criminally negligent for compromises.



