Infosecurity News

  1. Manchester City’s Scouting Database Compromised

    75% of the UK’s Premier League football clubs, and 50% of clubs in the major European leagues use the services of Scout7 to provide solutions in player scouting, recruitment and information management. Manchester City’s private database has been breached.

  2. Big Data causes big problems for security

    For enterprises, the ability to detect data breaches within minutes is critical in preventing data loss, yet only 35% of firms stated they have the ability to do this. The culprit? An ever-escalating array of data sources stemming from virtualization, anywhere, anytime work habits and an explosion of end-user devices and applications. In short, organizations around the world are finding themselves unable to harness the power of Big Data for security purposes.

  3. Opt-out porn filters in the UK by the end of the year

    UK ISPs will have porn filters operational before the end of 2013 said David Cameron’s ‘pornification’ advisor Claire Perry at a Westminster eForum last week.

  4. Blank media levy extended to smartphones and tablets

    The ‘blank media levy’ is effectively a tax on blank media (originally tape cassettes) designed to compensate content creators for illegal copying of copyrighted works. Over the years it was extended to include CDs, DVDs, hard disks – and is now making its first forays into devices that include solid state memory.

  5. Fortune 500 security policies are a mixed bag

    A research effort into the security practices of Fortune 500 companies has found that while a majority of the largest US public companies are following the Securities and Exchange Commission (SEC) Guidelines by providing some level of disclosure regarding data breaches, some companies that have had exposures have chosen to remain silent. And, companies may be underestimating certain risks, like state-sponsored cyber-espionage.

  6. Sweden effectively bans government use of Google

    An announcement from the Swedish Information Commissioner enjoins Salem Municipality ‘to either remedy the shortcomings of the agreement [to use Google’s cloud services] or to stop using the cloud service.’

  7. Gartner analysts drop the bomb on cyberwar hysteria

    In a talk this week’s Gartner Security and Risk Management Summit near Washington DC, two industry analysts from Gartner examined the hype and reality behind the idea of ‘cyberwar’ – defining what it is, what it is not, and what organizations should do to prepare.

  8. MBR-wiping malware targets German victims

    Master boot record wipers have been cropping up lately, most notably in a widespread attack on South Korea media properties. A new MBR-based hack is now targeting German users, who are at risk of having their systems rendered unusable by malware being sent via spam messages.

  9. Worldwide reaction to NSA/PRISM surveillance – an overview

    When the NSA's surveillance program was first revealed by Edward Snowden last week, initial reaction was that it was a US issue. But with the realization that the greater part of the world's internet traffic is at some point routed via the US, the worldwide ramifications are becoming better understood and questioned.

  10. KeyBoy backdoor targets attacks to Vietnam, India

    Researchers at Rapid7 have uncovered two specific attacks using a new backdoor malware targeting victims in Vietnam and in India. The security company has dubbed the threat KeyBoy after a string present in one of the samples.

  11. Unchecked admin rights a top threat to enterprises

    While IT security professionals recognize the threat posed by unwitting employees, many still admit to allowing administrative privileges to go unmanaged, making organizations increasingly vulnerable to malware exploits and unauthorized software, according to a survey by Avecto.

  12. New version of Zbot/Zeus found in the wild

    You cannot teach an old dog new tricks, says the old saying. Maybe you can, suggest security researchers after discovering a new self-propagating Zbot variant in the wild.

  13. Pirate Bay founder wanted for Danish hack

    Gottfrid Svartholm, one of the original founders of The Pirate Bay and currently awaiting a verdict for the hack of Logica in Sweden, is now wanted for another hack in Denmark: this time on CSC.

  14. The EU’s hacker legislation mirrors the US Computer Fraud and Abuse Act

    “This directive,” says rapporteur Monika Hohlmeier, “introduces much-needed common rules for criminal law penalties, and also aims to facilitate joint measures to prevent attacks and foster information exchange among competent authorities.”

  15. Car thieves found using handheld fobs to hack automatic car locks

    A mystery technology is allowing car thieves to pop open automatic car locks over the air using a hand-held device – but police have no idea how they’re managing to do it.

  16. Technical Skills Not Important for Future CISOs Declares Forrester

    In a session titled ‘Becoming the Future CISO’ at the Forrester Forum for CIO’s in London, England, June 6 2013, Andrew Rose declared the current role of CISO a dying breed.

  17. CESG publishes identity proofing guidelines

    Access management is designed to allow only authorized digital identities to gain access to a system. But a digital identity is nothing more than “a collection of attributes that uniquely define a person or organization.” Proofing is the process of ensuring that those attributes belong to the genuine applicant.

  18. Operation PRISM: NSA and FBI monitoring activity at Facebook, Apple, Google, and other tech firms

    It’s a potential publicity bomb that has yet to explode, apparently, but the Washington Post and the Guardian are reporting that both the US and the UK governments have been engaged in ongoing data collection of private information from web services, with the support of top tech companies, in an foreign intelligence effort code-named Operation PRISM.

  19. Adware: the most pervasive mobile threat

    A new examination of mobile threat data from the Lookout Platform in five countries has found that threats to consumers run the gamut, from annoying to extremely invasive. The study has uncovered that adware and malware threats like spyware, surveillanceware and trojans are in particular proliferating.

  20. Connected TVs open up a host of threat vectors

    In today’s world, everything from refrigerators to cars are beginning to get “connected” and given the ability to talk to you and to other things via broadband networks. Much of this still seems like science fiction, but when it comes to connected TVs, the concept has already jumped the chasm to the mainstream. And, like anything connected to the internet, smart TVs are turning out to be another threat vector for hackers.

What’s Hot on Infosecurity Magazine?