Infosecurity News

  1. File-sharing for personal use is not illegal in Portugal

    The latest move by rightsholders in Portugal in the ongoing war against file sharers has backfired dramatically: the Portuguese Prosecutor has declared that P2P file-sharing for personal use is not illegal.

  2. Businesses still lack confidence in the cloud

    The Cloud Security Alliance (CSA) and ISACA have issued their Cloud Market Maturity report, outlining the top 10 issues with cloud adoption by businesses. They found that confidence is lowest in government regulation as a factor in driving or securing the market.

  3. New Android trojan uses camera app to recreate user's physical surroundings

    Indiana University and the US Navy have created an experimental Android spyware trojan that takes over a device’s camera to take photos and build a 3-D model of the mobile user’s surroundings. The information is then gathered and uploaded to a central server.

  4. Level 3 enters the managed security market

    Level 3 Communications has launched a new global security solutions portfolio meant to provide an integrated approach for enterprises, encompassing layered security services, Level 3's communications networking and professional services. The solutions will be rolled out in a managed services environment.

  5. Microsoft faces $7 billion fine by EU

    Microsoft will be fined for failing to comply with a 2009 ruling from the EU, which had objected to the way the company was using its dominant operating system position to the advantage of its own browser.

  6. Europe says ICANN’s proposals are illegal

    ICANN is in the process of renegotiating the basis of the WHOIS database. Last week it reported that it “and the registrars are much closer to reaching a negotiated position on Whois verification and data retention.” But now Europe has said you can’t do that – it’s illegal.

  7. Private Facebook messages on Timeline? The social network says no

    Are private Facebook messages from the years 2007–2009 showing up on people’s public Timelines? Users say yes, but Facebook says the rumors are false.

  8. Adobe to revoke signing certificate after compromise of internal server

    Adobe is planning to revoke an Adobe code signing certificate, after hackers broke into an internal server to compromise the digital certificate. This allows the attackers to create files that appear to be legitimately signed by the software maker, but in fact contain malware.

  9. An Address from Theresa Payton, CEO, Fortalice & Former White House CIO

    Taken from our recent US Summer Virtual Conference, Theresa examines the current threat landscape

  10. Verizon joins Lockheed Martin Cyber Security Alliance to focus on public sector threats

    Verizon Enterprise Solutions has become the newest member of the Lockheed Martin Cyber Security Alliance, a collaborative effort to address national cyber defense challenges – including the growing threat posed by cyber attacks against the US' critical IT infrastructure.

  11. Unleashing the Potential of Cloud Computing in Europe

    Sandwiched between its proposed new Data Protection Regulation earlier this year and the new cyber security strategy expected later comes the EU’s new cloud strategy document: ‘Unleashing the Potential of Cloud Computing in Europe.’

  12. The ten security issues guaranteed to cause a flamewar

    To paraphrase Winston Churchill, “If you put two security experts in a room, you get two opinions, unless one of them is a user, in which case you get three opinions."

  13. Michigan healthcare providers turn to biometrics for patient data security

    Michigan healthcare providers will soon be implementing new biometric protections for identity access management to patient care records.

  14. IEEE data breach offers up 100K member logins

    The usernames and passwords of 100,000 members of the Institute of Electrical and Electronics Engineers (IEEE) have been found unencrypted on a FTP server by Radu Dragusin, a Romanian researcher.

  15. The VOHO campaign: Gh0st RAT spread by water-holing

    The VOHO campaign would appear to be a sophisticated and extensive APT-style attack targeting primarily political activists, the defense industrial base and education – especially in the Boston and Washington DC areas.

  16. Two separate privacy concerns rock Facebook

    As Facebook shares continue their general downward trend, the social network giant is rocked by two new privacy concerns: a glitch that has started to expose old private messages; and the tie-up with advertising metrics company Datalogix.

  17. Mobile malware up 2,180% in 2012

    The rise of mobile malware is becoming an industry meme, and no wonder: As mobility starts to permeate every aspect of consumer and business lives, malware vectors are increasing.

  18. New Islamist hacker collective emerges to protest 'Innocence of Muslims' video

    A new Islamist hacker collective has amassed to protest the “Innocence of Muslims” YouTube video, via attacks on several low-level Western websites. It promises continued action in the wake of the film.

  19. Android app piracy sees triple-digit growth

    Thanks to a lack of comprehensive content protection, Android developers are finding themselves at major risk for piracy, and it’s significantly impacting their business, according to a new survey from Protection Technology Research (PTR).

  20. What is Microsoft doing with Hotmail passwords?

    Costin Riau, a security expert with Kaspersky Lab, tried to log into his old hotmail account with his old hotmail password – all 36 characters. It failed, with an error message saying, “Microsoft account passwords can contain up to 16 characters.”

What’s Hot on Infosecurity Magazine?