Infosecurity News

  1. ISSE 2012: Securing the OS and User Experience is Key to Securing Smartphones, Says BlackBerry

    Smartphones should be shipped with microkernel technology from the beginning and a sandbox for every application, Patrick Michaelis, senior product manager, BlackBerry Security, told the audience at ISSE 2012 in Brussels, 23rd October. “The technology is 25 years old but nobody is using it”, he said.

  2. Microsoft settles with Sabelnikov over the Kelihos botnet

    A short note on Andrey Sabelnikov’s Facebook page says simply, “Endless story is ended at last.” Sabelnikov is the Russian coder accused by Microsoft of being the man behind the Kelihos botnet. Sabelnikov denied this – and now the two sides have reached an agreement.

  3. Piers Morgan’s denial of phone hacking at The Mirror to be tested in court

    Just weeks before the Leveson Inquiry is expected to deliver a critical report on press ethics to prime minister David Cameron, a new lawsuit over alleged phone hacking is filed; this time against Trinity Mirror Group, including the time when Piers Morgan was editor.

  4. Japan & India strengthen cyber-security cooperation

    During a meeting to exchange views on regional and international security, including maritime, cyber and outer-space security, India and Japan have agreed to kick off the India-Japan Cyber Security Dialogue, starting with an early meeting in the coming months.

  5. Cross-zone scripting vulnerabilities found in Dropbox and Drive

    “Exploiting this vulnerability,” announced IBM’s Application Security Insider blog, “an attacker could steal arbitrary files from a DropBox / Google Drive user by tricking him into viewing a malicious HTML file inside the mobile app.”

  6. Passwords: young people are lax, rich people are careful

    A new survey on password attitudes shows a difference between age groups, income, marital status and more – providing intriguing data that might be as valuable to the sociologist as to the security industry.

  7. Pacemaker virus could lead to "mass murder"

    Hackers now have a new attack vector, but one with much more serious consequences than data theft or financial ruin: pacemakers and implantable cardioverter-defibrillators (ICDs).

  8. Top 5 UK SMS spam campaigns are finance-related

    When it comes to mobile spam, some campaigns are destined for the Hall of Fame, thanks to how widespread they’ve become. Taking a look at the contenders, mobile security firm AdaptiveMobile has ranked the top five SMS spam campaigns that have plagued UK mobile phone users in 2012—and they all revolve around finances.

  9. Multi-device, multi-vendor IT security departments lack automation, grow risk

    Unsurprisingly, complexity in network security environments, particularly multi-vendor environments, yields risk, according to a new survey. And yet, manual processes and a lack of consolidation across operations is still the norm even as IT departments add more and more vendors, devices and firewall rules. This creates a gap between the capacity of the IT staff to manage systems and the rate of their proliferation.

  10. Shining a light on zero-day attacks

    A new study by Symantec researchers seeks a better understanding of zero-day attacks – and finds them more, prevalent, longer-lasting and more dangerous than hitherto realised.

  11. ISO releases cyberspace-focused security standard

    The ISO has released a brand-new cyber-security standard aimed at ensuring the safety of online transactions and personal information exchanged over the internet, including e-commerce, online banking, virtual medical records, remote office applications and more.

  12. miniFlame emerges as small, highly targeted cyber-espionage tool

    Spyware families are propagating, with the latest identified spawn being miniFlame, a “small and highly flexible malicious program” suitable for targeted, in-depth cyber espionage operations, according to Kaspersky Lab.

  13. Facing a malware onslaught, Google plans scanner for mobile app market

    Google is plotting ways to implement a client-side solution to prevent rogue apps from being downloaded from Google Play, the Android application store, according to an analysis.

  14. UK government’s Facebook login proposals don’t hold water

    Earlier this month there was much discussion in leading UK national newspapers about a proposal to allow the use of social media credentials to access government websites. This was confirmed by the Government Digital Service blog, which has promised more details in the next few weeks.

  15. Randomness and the Intel Ivy Bridge microprocessor

    Cryptography Research (CRI) has published its investigation into the random number generator used by the Intel Ivy Bridge processor, the processor that is likely to be used by the majority of new PCs and laptops now and for the immediate future.

  16. ENISA summarizes risks and opportunities of IT consumerization

    The European Network and Information Security Agency (ENISA) has summarized both the risks and opportunities in the ‘consumerization of IT’, the business trend that includes BYOD.

  17. TD Bank lost customer data – six months ago

    The first public indication of the loss appeared on the California Attorney General website, with the publication of a sample ‘notification’ letter now being sent to the bank’s affected customers.

  18. ISF issues cybersecurity Benchmark as a Service

    In an effort to make the evaluation of security resilience and risk reduction strategies more accessible, the Information Security Forum (ISF) has launched a “Benchmark as a Service” (BaaS) tool, for real-time benchmarking via the cloud.

  19. Hackers and crackers invited to decode an 'unbreakable' secret message

    Wannabe code-crackers have a fresh challenge to rise to, if DeTron has its way. The encryption company ran a full page ad in the New York Times late last week challenging code breakers, hackers and cryptographers to crack a message encrypted by Quantum Direct Key (QDK) – a personal identification encryption technology aimed at eliminating multiple passwords for cloud services and web apps.

  20. New GCHQ Territorial (Spook) Army

    The UK’s Territorial Army is a paid force of part-time volunteers that make up around 25% of the army’s manpower. It is considered an essential part of the UK’s defense force. Now GCHQ is thinking of using the same principle to bolster the UK’s cyber defense.

What’s Hot on Infosecurity Magazine?