Infosecurity News

  1. Bodog takedown: maybe SOPA and PIPA and ACTA and DEA just aren’t necessary

    Civil liberties groups are happy that SOPA has, at least temporarily, gone away; and that ACTA seems to be running into problems in some European countries. But given recent LEA takedowns, are these new laws even necessary?

  2. RSA 2012: Anonymous shakes up complacent corporate management

    Anonymous has had at least one beneficial effect: top management at companies are starting to pay attention to information security, judged Grady Summers, vice president at MANDIANT, who participated in a Wednesday panel discussion on hacktivism at the RSA Conference.

  3. RSA 2012: Are software liability laws needed?

    Software liability laws are needed to hold software companies accountable for making faulty products, argued Bruce Schneier, chief technology security officer with BT during a pro-con debate held Wednesday at the RSA Conference.

  4. RSA 2012: Schneier on why Anonymous is not a group and why they’re certainly not as good as you think they are

    At the RSA Conference 2012 in San Francisco, February 29, Bruce Schneier and Davi Ottenheimer discuss Schneier’s latest book and how to enable the trust that society needs to thrive.

  5. RSA 2012: BYOD often means ‘bring your own danger’

    Three-quarters of IT professionals believe that personally owned mobile devices put their organizations at risk and only 39% have the necessary security controls to address the risk posed by the bring-your-own-device (BYOD) phenomenon, according to a Websense-sponsored survey by the Ponemon Institute released Wednesday at RSA.

  6. Risky business: IT professionals use risky methods for access control

    A majority of information security professionals are employing risky methods to control access to enterprise servers, according to a survey by Fox Technologies and Echelon One.

  7. XSS vulnerabilities discovered almost on demand

    The last week has seen multiple XSS vulnerabilities found almost anywhere and everywhere on the internet, lending early weight to predictions for 2012.

  8. Identity theft remains the major complaint reported to the FTC

    For the 12th consecutive year the FTC has revealed that identity theft tops the list of consumer complaints received: 15% of 1.8 million complaints in 2011.

  9. RSA 2012: Cyber security school challenge reaches 8000 children in 2011

    At the RSA conference in San Francisco, February 28 2012, Joyce Brocaglia, founder of the Executive Women’s Foundation, hosted a session on the logistics and impact of the cyber security school challenge - a collaborative outreach program that helps educate youth on the topics of online security, privacy, and safety.

  10. RSA 2012: Schneier reveals three biggest information security risks in 2012

    In his session at the RSA Conference in San Francisco, February 28th 2012, Bruce Schneier listed what he perceives to be the three biggest risks to information security right now: The rise of big data; ill-conceived law enforcement regulations; and the cyberwar arms race.

  11. RSA 2012: Coviello's mea culpa

    Looking none the worse for wear from the huge RSA data breach last year, Chairman Arthur Coviello Jr. said he and his team felt the breach “personally” and have struggled to regain the company's reputation in the security community.

  12. Gatekeeper – a new security feature or a walled garden for OSX?

    Apple’s OSX 10.8 Mountain Lion due this summer will contain a new feature called Gatekeeper. Opinions vary on whether it is a genuine security feature or the cornerstone of a new walled garden.

  13. WikiLeaks redux: Site teams with hacktivists to publish Stratfor emails

    WikiLeaks is back in the news. The site dedicated to leaking state secrets has teamed with Anonymous to disclose emails from intelligence firm Stratfor, which Anonymous offshoot LulzSec breached in December.

  14. Agari expands use of DMARC email security standard through new program

    Based on the DMARC email authentication standard announced last month, Agari has launched a receiver program that enables mailbox providers to adopt DMARC and improve their customers’ email security.

  15. OACP website hacked in protest against Canadian Bill C-30

    The OACP website currently displays a simple message: “Ontario Association of Chiefs of Police - UNDER MAINTENANCE”

  16. Former McAfee researcher exploits zero-day hole in smartphone browser

    Former McAfee researcher Dmitri Alperovitch has successfully exploited a zero-day vulnerability in an Android smartphone and installed Nickispy malware that can control the device, record calls, access texts and emails, and pinpoint location.

  17. FCC calls on service providers to step up efforts to combat online threats

    The US Federal Communications Commission (FCC) is urging internet service providers (ISPs) to take a more proactive approach in combating online threats.

  18. Top-secret Anglo-French drone plans stolen

    A briefcase reportedly containing top secret documents about an Anglo-French drone project was stolen from a senior Dassault Aviation executive on his way to London.

  19. AlienVault’s Open Threat Exchange

    National security strategies frequently stress the need and desirability for information sharing to counter cyber security threats. But while they have few concrete proposals, business is going ahead on its own.

  20. Firms move ahead with mobility, despite security concerns

    Although 71% of enterprises are considering deploying custom mobile applications, 41% are concerned about the security risks posed by mobility programs, according to a survey sponsored by Symantec.

What’s Hot on Infosecurity Magazine?