Infosecurity News

  1. TD Bank lost customer data – six months ago

    The first public indication of the loss appeared on the California Attorney General website, with the publication of a sample ‘notification’ letter now being sent to the bank’s affected customers.

  2. ISF issues cybersecurity Benchmark as a Service

    In an effort to make the evaluation of security resilience and risk reduction strategies more accessible, the Information Security Forum (ISF) has launched a “Benchmark as a Service” (BaaS) tool, for real-time benchmarking via the cloud.

  3. Hackers and crackers invited to decode an 'unbreakable' secret message

    Wannabe code-crackers have a fresh challenge to rise to, if DeTron has its way. The encryption company ran a full page ad in the New York Times late last week challenging code breakers, hackers and cryptographers to crack a message encrypted by Quantum Direct Key (QDK) – a personal identification encryption technology aimed at eliminating multiple passwords for cloud services and web apps.

  4. New GCHQ Territorial (Spook) Army

    The UK’s Territorial Army is a paid force of part-time volunteers that make up around 25% of the army’s manpower. It is considered an essential part of the UK’s defense force. Now GCHQ is thinking of using the same principle to bolster the UK’s cyber defense.

  5. Malicious emails: Romney almost President

    A new malicious email campaign pretends to be from CNN. It announces breaking news – Mitt Romney is ‘almost president’. But it leads to a Blackhole exploit site.

  6. Firefox 16 shipped, pulled and updated within 2 days

    Firefox 16 was released on Tuesday, pulled from the download page on Wednesday, and replaced with Firefox 16.0.1 on Thursday. The main cause was that Tuesday’s version introduced a new critical bug that was fixed by Thursday.

  7. SMBs more vulnerable to data breaches than larger brethren

    Contrary to conventional wisdom, hackers don’t just target large enterprises with vast amounts of data to steal. Small- and medium-sized businesses are just as attractive of targets, and in some cases are more so.

  8. RSA Europe 2012: Anonymous responds to Corman’s comments

    “Anonymous has very few hackers, it has very few activists… It is very misleading to call the groups hacktivists. The common attribute is angst. The talented ones are either quitting or starting to do things that are more clandestine.”

  9. Teen hacker earns $60K for full Google Chrome exploit

    A teenage hacker with the handle 'Pinkie Pie' has nabbed a $60,000 prize from Google, for launching a full Chrome exploit for the second time.

  10. First annual report of cyber incidents in the EU

    The European Network and Information Security Agency (ENISA) has published its first Annual Incidents Report from data supplied in conformance with Article 13a of the EU’s telecom reform directive.

  11. RSA Europe 2012: UK’s ID Assurance Programme puts verification choice into user’s hands

    At this week’s RSA Europe Conference in London, representatives from the UK Government outlined details of a pan-government model for identity assurance that engages the services of third-party ID verification providers

  12. Android adware, Zitmo botnets and Romanian hackers, oh my!

    We're not in Kansas anymore: The third quarter of 2012 saw a marked increase in Android adware, while new evidence surfaced suggesting that the Zeus-in-the-Mobile (Zitmo) banking trojan is evolving into a botnet. And, Romanian hackers are continuing to perform large-scale scanning for web vulnerabilities, according to the quarterly threat assessment from Fortinet.

  13. RSA Europe 2012: DDoS Attacks Used as Diversion Technique

    DDoS attacks are being used as a component in the newly emerged multi-flank attacks, Symantec’s deSouza told his audience at RSA Europe 2012 in London, 09 October 2012.

  14. RSA Europe 2012: Replace perimeter-based security with intelligence-based security, says Art Coviello

    Art Coviello, executive vice president , EMC Corporation and executive chairman, RSA, opened RSA 2012 with a very clear message in his keynote: perimeter-based security strategies need to be replaced with intelligence-based strategies.

  15. Bad Bad Piggies – beware of fakes

    No slouches in spotting an opportunity, the bad guys have already focused on Rovio’s new Angry Birds spin-off, Bad Piggies. Be careful what you install – it might be a real pig.

  16. Mac-focused malware is big and getting bigger

    Despite the Mac reputation as being more secure because of Apple’s tight control over its vertically integrated ecosystem, Mac-specific malware and advanced persistent attacks (APTs) against human rights groups is on the rise, cautions Citizen Lab Senior Security Analyst Seth Hardy.

  17. World of Warcraft hit by hacking massacre

    Apocalypse has come to World of Warcraft: whole cities have been massacred in the online adventure game, leaving nothing but smoking wreckage.

  18. The 2012 Cost of Cyber Crime Report Says Successful Attacks Doubled

    The 2012 Cost of Cyber Crime study is published today. It’s good news and bad news. The frequency of successful cyber attacks has more than doubled over the last three years, but the annual cost to organizations has slowed dramatically in the last two years.

  19. DarkAngle trojan masquerades as Panda Cloud AV

    In a new twist to ‘rogueware’, Panda Security has warned that its cloud antivirus product name is being used to mask a particularly unpleasant trojan called DarkAngle. While victims may believe that they are installing anti-malware, they may actually be installing the malware itself.

  20. Microsoft will reject ‘weak’ digital certificates from tomorrow

    A weak digital certificate is defined as one signed with an RSA key of less than 1024 bits. Since it is now generally accepted that keys of a lesser length can be brute-forced with modern computing power, Microsoft is upping the ante by forcing a move to a stronger key length.

What’s Hot on Infosecurity Magazine?