Infosecurity News

  1. DDoS and the challenge of civil disobedience on the internet

    Starting with the Anonymous Operation Payback in 2010, in retaliation for what many consider the illegal financial blockade of WikiLeaks, DDoS as a weapon of dissent has increasingly become a part of life on the internet.

  2. Education Institutions at Forefront of BYOD

    BYOD as a security issue has largely focused on the business arena – the dangers inherent in allowing personal smartphones and tablets to connect to the corporate network. But mobile devices have been adopted as a way of life with youngsters, and in some ways education has led the BYOD phenomenon.

  3. Blue Coat Systems to acquire Solera Networks

    Blue Coat operates largely outside of the perimeter; Solera Networks operates within the perimeter. Put the two together and you have the complete security solution – that is the the theory behind Blue Coat’s latest acquisition.

  4. Most small businesses don't understand mobile security threats

    New research into eight critical security threats on mobile devices found the majority of small to medium enterprises (SMEs) are either unaware of or defenseless against the threats posed to their networks by mobile devices and BYOD.

  5. The HangOver Campaign - more on Indian hackers targeting Pakistan

    A few days ago details of a long-standing and wide-ranging attack primarily against Pakistan and apparently emanating from India were released. Now it appears it was just the tip of an iceberg.

  6. Queen's Speech and user identification through IP addresses

    The reason for Her Majesty's government to bring forward proposals viz-a-viz "the problem of matching Internet Protocol addresses" (Queen's Speech 2013) may have as much to do with BT's current plans as with the stalled Communications Data Bill.

  7. Mandiant: Chinese espionage hackers are back

    The group of Chinese cyber-espionage hackers reportedly operating as an arm of the People’s Liberation Army is allegedly back at it, attacking a range of US enterprise and government targets to steal everything from technology blueprints to business plans to manufacturing information.

  8. Password strength meters inspire better choices – but only for sensitive accounts

    Password strength meters that offer web surfers a visual gauge of how weak or strong a chosen lock may be are increasingly present on websites – but how effective are they at getting folks to choose stronger options? When it comes to locking down sensitive data, meters had an impact, suggesting that they act as important reminders for users about what’s at stake.

  9. Snapchat's woes escalate with complaint to FTC

    First it was shown that Snapchat photos and videos on Android are not deleted, merely hidden; then a YouTube video shows how to locate Snapchat videos on iOS; and now a complaint alleging deceptive business practices has been filed with the FTC.

  10. UK customers charged twice with contactless payment cards

    Marks and Spencer, Pret a Manger and Transport for London customers have all reported automatic payment deductions from contactless payment cards while they were making payment by other means, renewing long-standing concerns over the security of contactless payment cards.

  11. 22 million user IDs may have been stolen from Yahoo Japan

    Yahoo Japan, 35.5% owned by Japan’s mobile phone operator SoftBank and 34.7% owned by Yahoo Inc, announced Friday that it may have lost 22 million user IDs from its total of around 200 million.

  12. The APPS Act – a proposal to protect users’ mobile privacy

    Rep. Hank Johnson, D-Ga, has introduced the bipartisan Application Privacy, Protection and Security (APPS) Act of 2013 (H.R. 1913). Its purpose is to require app developers to maintain privacy policies, obtain consent from consumers before collecting data, and securely maintain the data they collect.

  13. Indian malware campaign targeting Pakistan uncovered

    A leading anti-malware company has uncovered a wide-ranging malware campaign that appears to originate in India and seems primarily to target Pakistan with data-stealing malware.

  14. New Mac malware discovered live on stage

    Proving that not all demonstrations are staged, a previously unknown Mac backdoor was discovered during a live presentation at the Oslo Freedom Forum earlier this week.

  15. DHS: Critical infrastructure threats up 68% in 2012

    Critical infrastructure threats are up significantly according to US officials – a worrying state of affairs that spans a wide range of threat vectors and potential participants.

  16. Did Stuxnet help rather than hinder Iran’s nuclear program?

    Stuxnet is often cited as history’s first true cyber weapon. By common consensus it was developed and used by the US and Israel to successfully disrupt Iran’s nuclear program – but a new report questions its success.

  17. CISO: Chief Infosec Scapegoat Officer

    CISOs are often the first victim following a major security breach. Given the prevalence of such breaches, the average tenure of a CISO is now just 18 months; and this is likely to worsen if corporate security doesn’t improve.

  18. Enhanced and advanced Pushdo botnet is back

    Pushdo, one of the more enduring and resilient botnets, has already survived four takedowns in five years. Now a new variant with new evasion techniques has been detected.

  19. Twitter Uses Automation to Improve Security

    The Twitter product security team are improving the security of their code by adopting more security automation.

  20. LulzSec 'pirates' plead guilty to hacking

    Four LulzSec members who claim to be "latter-day pirates" have plead guilty to hacking charges and compromising millions of people's information.

What’s Hot on Infosecurity Magazine?