Infosecurity News

  1. Huron Legal Adds Data Breach Speciality Practice

    In a sign of the times, at least one non-security consulting firm is launching a cyber-incident response service.

  2. Tennessee Electric Sues Bank Over Cyber-Heist

    The lawsuit could set an important precedent for cyber-heist liability.

  3. UK SMBs Failing to Manage Ex-Employee Risk

    Staff frequently take passwords with them and store business files in personal cloud services, says Intermedia.

  4. Blackberry Z10 Authentication Bypass Opens Remote Access to Hackers

    Attackers can use a file-sharing feature to access confidential info or serve targeted malware.

  5. Malware No Longer Avoids Virtual Machines

    Most enterprises are implementing virtualization, so malware authors are learning to write their code to attack that infrastructure more effectively.

  6. Android RAT Krysanec Masquerades as Legit Apps

    Undetected, the bug sets up a backdoor to siphon off all kinds of personal information.

  7. LastPass Users Left in the Lurch After Massive Outage

    Datacenter downer as firms are left unable to access key online accounts

  8. Chinese Heart App Virus Slams 100,000 Android Phones

    Malware written by software student spreads like wildfire in the Middle Kingdom.

  9. 2014 So Far: The Year of the Data Breach

    Attacks are intensifying, and have already claimed 10 million personal records.

  10. SecureAuth Adds Risk-based Authentication Scheme

    Latest stab at "post-password" security adds live threat intelligence to the mix.

  11. Xiaomi Issues Update After Data Privacy Concerns

    MIUI Cloud Messaging made opt-in after negative feedback.

  12. Need Data Breach Statute Compliance? There's an App for That

    Data Breach 411 for Apple OS gives executives all the state security breach statutes at their fingertips.

  13. Click Fraud Malware Found Lurking Inside Image Files

    Dell SecureWorks researchers warn of growing threat from digital steganographic techniques.

  14. XSSposed Aims to Call Out Compromised Websites

    The public archive of compromised websites is meant to motivate companies to patch simple vulnerabilities.

  15. Sophisticated Spy Campaign Targets Former Eastern Bloc Countries

    Espionage malware has persisted in embassies and state offices for at least four years.

  16. BlackHat 2014: Mobile Point of Sale Devices at Risk from Hackers

    Hackers can take over mobile point of sale devices through various means, including inserting a maliciously crafted card.

  17. BlackHat 2014: Medical Device Security Not as High Risk as Previously Claimed

    While it's true that medical devices are vulnerable and can be tampered with, these attacks are still in the realm of unlikelyhood.

  18. BlackHat 2014: Square Launches Bug Bounty Program

    The program has paid $250-$1,500 per bug for uncovering card payment issues.

  19. Google Gives HTTPS a Helping Hand by Demoting Insecure Sites

    Web giant will use the secure protocol as a ‘signal’ in search ranking algorithm

  20. FBI Used Drive-By-Downloads to Expose Tor Pedophiles

    Controversial Operation Torpedo has come to light through released court documents.

What’s Hot on Infosecurity Magazine?