Infosecurity News
Want someone else’s Hotmail account?
A software bug can often lead to a vulnerability that can be exploited with sophisticated exploit code. Or sometimes you can just instal a free add-on that lets you do the same thing with no effort.
SOCA and the FBI takedown 36 AVC websites
In a joint exercise between between multiple law enforcement agencies, 36 websites associated with an e-commerce platform known as an automated vending cart (AVC) used to sell stolen credit cards were taken down on Wednesday.
Hacker could take over traffic and railroad control systems using backdoor
A researcher has uncovered a backdoor in RuggedCom software used to control traffic and railroad systems that could enable a remote attacker to take control of the systems.

Hacker posts VMware source code on internet
A hacker has posted source code for VMware’s ESX virtual machine on the internet, the company has confirmed.

Infosecurity Europe 2012: The ICO on better regulation and better infosec
Christopher Graham, the UK Information Commissioner, talks about his role as an information regulator and facilitator at Infosecurity Europe in London
One in five Macs harbors malware, Sophos finds
A disturbing one in five Mac computers are infected by some form of malware, according to research by IT security firm Sophos.

Infosecurity Europe 2012: defining risk management in the context of information security
The three companies represented on the keynote panel (G4S Secure Solutions, Steria UK, and Skipton Building Society) are very different; and their CISOs have very different views on the functioning of risk management within infosec.
DHS, industry organizations form first cybersecurity center for healthcare
The US Department of Health and Human Services, the Health Information Trust Alliance (HITRUST), and 14 healthcare organizations have set up the first Cybersecurity Incident Response and Coordination Center for the healthcare industry
Cybercriminals exploit Björk’s Biophilia app to compromise Androids
Symantec has identified a social engineering scam that attempts to get users to download malware from third-party Android sites by passing itself off as part of pop icon Björk’s popular Biophilia app.
Khosrow Zarefarid explains why he published 3m Iranian card details
I am not a hacker, says Zarefarid. I did this to warn Iranian card holders that their accounts are in danger.

Trojan used hacked WordPress sites to carry out mass Mac infections
The Flashback trojan, which infected more Macs than any other malware in history, used hacked WordPress sites to get onto machines, according to Kaspersky Lab researcher Vicente Diaz.

Data breach hits 228,000 South Carolina Medicaid recipients
The South Carolina Department of Health and Human Services announced this week that an employee stole personal data on 228,000 Medicaid recipients.
European Parliament approves the controversial EU/US PNR agreement
“The EU-US Passenger Name Record (PNR) agreement was adopted with 409 votes in favour, 226 against and 33 abstentions,” announced the EU yesterday. Opponents included “rapporteur Sophie in'T Veld, who withdrew her name from the report.”

BSI updates standards for information security auditing
The British Standards Institution (BSI) has recently updated its standards for information security auditing, BSI officials told Infosecurity.

Web inventor says UK government's snooping bill is dangerous
The UK government's plans to allow security and police services to spy on e-mails, phone calls and internet browsing habits are dangerous, according to World Wide Web inventor, Sir Tim Berners-Lee.
New trojan attacks the hotel rather than the guests
Trusteer has discovered spyware being sold in underground forums for $280. It targets hospitality PoS applications.
Google warns 20,000 webmasters about ‘weird redirects’ to malicious sites
Google is warning around 20,000 webmasters that their sites may be compromised and are carrying out “weird redirects” to malicious sites.
PwC 2012 Information Security Breaches Survey: Preliminary findings report continued mobile insecurity
New statistics show that while many companies appear to understand the business threat from BYOD, many others are taking no precautions whatsoever.
(ISC)² launches its new EMEA advisory board
In a move designed to offer genuine hands-on security experience to EMEA’s different security initiatives, professional body (ISC)² has launched a new Advisory Board for Europe, the Middle East and Africa (EAB).

Scammers target Verizon Wireless customers after AT&T attacks
Spammers have their sites on Verizon Wireless customers after targeting those of AT&T Wireless earlier this month.



