Infosecurity News
KeyBoy backdoor targets attacks to Vietnam, India
Researchers at Rapid7 have uncovered two specific attacks using a new backdoor malware targeting victims in Vietnam and in India. The security company has dubbed the threat KeyBoy after a string present in one of the samples.
Unchecked admin rights a top threat to enterprises
While IT security professionals recognize the threat posed by unwitting employees, many still admit to allowing administrative privileges to go unmanaged, making organizations increasingly vulnerable to malware exploits and unauthorized software, according to a survey by Avecto.
New version of Zbot/Zeus found in the wild
You cannot teach an old dog new tricks, says the old saying. Maybe you can, suggest security researchers after discovering a new self-propagating Zbot variant in the wild.
Pirate Bay founder wanted for Danish hack
Gottfrid Svartholm, one of the original founders of The Pirate Bay and currently awaiting a verdict for the hack of Logica in Sweden, is now wanted for another hack in Denmark: this time on CSC.
The EU’s hacker legislation mirrors the US Computer Fraud and Abuse Act
“This directive,” says rapporteur Monika Hohlmeier, “introduces much-needed common rules for criminal law penalties, and also aims to facilitate joint measures to prevent attacks and foster information exchange among competent authorities.”
Car thieves found using handheld fobs to hack automatic car locks
A mystery technology is allowing car thieves to pop open automatic car locks over the air using a hand-held device – but police have no idea how they’re managing to do it.
Technical Skills Not Important for Future CISOs Declares Forrester
In a session titled ‘Becoming the Future CISO’ at the Forrester Forum for CIO’s in London, England, June 6 2013, Andrew Rose declared the current role of CISO a dying breed.
CESG publishes identity proofing guidelines
Access management is designed to allow only authorized digital identities to gain access to a system. But a digital identity is nothing more than “a collection of attributes that uniquely define a person or organization.” Proofing is the process of ensuring that those attributes belong to the genuine applicant.
Operation PRISM: NSA and FBI monitoring activity at Facebook, Apple, Google, and other tech firms
It’s a potential publicity bomb that has yet to explode, apparently, but the Washington Post and the Guardian are reporting that both the US and the UK governments have been engaged in ongoing data collection of private information from web services, with the support of top tech companies, in an foreign intelligence effort code-named Operation PRISM.
Adware: the most pervasive mobile threat
A new examination of mobile threat data from the Lookout Platform in five countries has found that threats to consumers run the gamut, from annoying to extremely invasive. The study has uncovered that adware and malware threats like spyware, surveillanceware and trojans are in particular proliferating.
Connected TVs open up a host of threat vectors
In today’s world, everything from refrigerators to cars are beginning to get “connected” and given the ability to talk to you and to other things via broadband networks. Much of this still seems like science fiction, but when it comes to connected TVs, the concept has already jumped the chasm to the mainstream. And, like anything connected to the internet, smart TVs are turning out to be another threat vector for hackers.
‘Beyond Orwellian’ – the FBI and NSA spy on all Americans
The Guardian newspaper has exposed a Foreign Intelligence Surveillance Court (FISC) ‘top secret’ order requiring Verizon to provide the NSA with all ‘telephony metadata’ for communications within the USA and between the USA and abroad.
Secunia names new CEO
Secunia, the Copenhagen-based provider of security software, announced the appointment of Microsoft’s Peter Colsted as the firm’s new chief executive.
Human error and system glitches drive nearly two-thirds of data breaches
The Ponemon Institute today released the 2013 Cost of Data Breach Study: Global Analysis which reveals data breaches are often the result of poor processes, and the latest study from Ponemon Institute bears this out: Human errors and system problems caused two-thirds of data breaches in 2012. They also pushed the global average cost to $136 per compromised record.
The effect of BYOD on information security
A new survey outlines the practical experience of IT/security professionals over the increasing use of personal devices within their business environment during the last 12 months.
Adobe CSO: Fixing vulnerbilities won't thwart hackers
For commercial software coders looking to thwart cybercriminals, finding and fixing vulnerabilities is all well and good. In reality, though, that approach to product security can be a colossal waste of time and resources, according to Adobe's Brad Arkin. What really makes a difference is mitigation.
Americans concerned about data breaches, but split on government disclosure regulation
As the government continues to mull regulations on cybersecurity info-sharing, a survey shows that a majority of Americans (82.1%) are concerned about a data breach involving at least one of five organization types. However, they’re evenly mixed on whether legislation should require private businesses to share cyber-attack information with the government.
NetTraveler spyware compromised 1,000 political and industrial targets
The malware behind a widespread cyber-espionage campaign against political and critical industry targets has been called out: NetTraveler, a malicious program used for covert computer surveillance, has successfully compromised at least 350 high-profile victims in 40 countries, with the total likely closer to 1,000.
New smartphone chip solves the mobile digital rights management problem
ARM, the British chip manufacturer that dominates the world's smartphones, is making it more attractive for high-value video content producers (Hollywood studios) to make HD films available on smartphones.
Be careful where you get your Apple iOS7 news – it may be a phish
Security researchers have discovered a new phishing website ‘under construction’; one designed to take advantage of rapidly growing iOS7-mania.



