Infosecurity News

  1. DigiNinja analyzes the Twitter hack, and offers password advice to web services

    Yesterday we reported that 55,000 Twitter accounts have been leaked on Pastebin. Security researchers Anders Nilsson and Robin Wood have separately analyzed the dump.

  2. Net neutrality becomes law in The Netherlands

    The net neutrality provisions approved by the Dutch Parliament last June as part of its implementation of the European telecommunications package became law yesterday.

  3. Natural gas pipelines targeted by cyber attack

    A spear-phishing campaign aimed at US natural gas pipeline companies has been underway since December of last year, according to the US Industrial Control Systems Cyber Emergency Response Team (ICS-CERT).

  4. Syrian activists targeted with RATs

    There have been several recent examples of Syrian activists being tricked into downloading and installing remote access tools (RATs) that secretly hand control of their computers to a third party.

  5. Encryption passwords exposed by Apple's Lion OS X update

    Apple exposed encryption passwords of FileVault users in its Lion OS X 10.7 security update, says researcher.

  6. South African ISPs team with Australian colleagues on cybersecurity code

    South Africa’s Internet Service Providers’ Association (ISPA) has teamed with Australia’s Internet Industry Association to develop a new voluntary industry code of practice to improve cybersecurity for end users.

  7. PandaLabs malware report – and the balance between law enforcement and user

    Almost one-in-four computers in the UK is infected – and the UK is one of the least infected countries in the world, says the new PandaLabs report released today.

  8. Federal prosecutors charge Irish, British suspects in Stratfor breach

    US federal prosecutors in Manhattan have charged four Irish and British men for helping with the breach of the US security analysis firm Stratfor last year.

  9. MoD admits hackers have breached top secret systems

    Hackers have breached some of the top secret UK Ministry of Defence computer systems, the military's head of cybersecurity has revealed.

  10. OpBayBack announced by Anonymous look-alike: TheWikiBoat

    It was only a matter of time before one hacktivist group or another would react to the UK court-ordered ISP block on The Pirate Bay.

  11. The UK Protection of Freedoms Bill this week; telecommunications surveillance next week?

    A major plank of both the Conservative and LibDem election campaigns was to ‘roll back the database state’ and curtail invasive bureaucratic surveillance. But has the Coalition achieved this? And what about the proposed communications monitoring bill?

  12. LOIC DDoS tool – is it 'safe' for the user?

    The DDoS weapon of choice for Anonymous activists, the Low Orbit Ion Canon (LOIC), was downloaded from the internet 381,961 times during 2011. That number has already been exceeded in 2012, with daily downloads averaging more than 3400.

  13. Security firm finds dodgy Android apps that offer "free" stuff to get information

    GFI Software researchers have identified 20 Android applications on the Google Play marketplace that lure users with offers of “free” products or money to fill out surveys.

  14. New NIST protocol enables secure biometric data access

    The US National Institute of Standards and Technology (NIST) has published a new protocol for securely communicating with biometric sensors over wired and wireless networks using web services.

  15. SOCA knocked off the web by DDoS – again

    The UK’s Serious Organised Crime Agency has today confirmed that a DDoS attack forced it take its website off-line at 22:00 Wednesday. As of writing, 14:30 Thursday, it is still down.

  16. The evolving role of the CISO – new study by IBM

    A study by IBM’s Center for Applied Insights concludes that there are now three ‘types’ of CISO: influencers, protectors and responders. Evolution towards the ‘influencer’ role is necessary, and happening.

  17. Hackers levy an ‘idiot tax’ on Belgian bank

    “While this could be called 'blackmail,' we prefer to think of it as an 'idiot tax' for leaving confidential data unprotected on a Web server,” announces an unidentified hacker group in a news statement on Pastebin.

  18. Google releases security update for Chrome 18 web browser

    Google has updated its Chrome 18 web browser with fixes for five vulnerabilities, including three high-risk flaws.

  19. Al-Qaeda uses steganography - documents hidden in porn videos found on memory stick

    Steganography is the science of hiding data. Its most common digital use is to hide data within graphics – text hidden in a picture. Al-Qaeda apparently hid documents within porn videos on a memory stick.

  20. Number of vulnerabilities down, malicious attacks up

    While the number of vulnerabilities decreased by 20%, the number of malicious attacks continued to skyrocket by 81% in 2011, according to Symantec’s annual 'Internet Security Threat Report'.

What’s Hot on Infosecurity Magazine?