Infosecurity News

Growing concern over what Microsoft may be doing with Skype
Following the first ever loss reported by Microsoft last week – largely blamed on the purchase of aQuantive in 2007 – it is the purchase of Skype for $8.5 billion in 2011 that is most concerning security folks.

Nearly 70,000 mobile phones will be lost or stolen during the London Olympics
Venafi has been extrapolating statistics from mobile phone loss – and expects the equivalent of 200 million books full of data will be lost during the course of the London Olympics.
Group claims credit for hack into Yale's network
The group NullCrew has claimed that it hacked into Yale University’s network and stole user names, passwords, social security numbers, addresses, and phone numbers of 1,200 students and staff.
Police close the investigation into ClimateGate
Nearly three years ago, computers at the University of East Anglia were breached and thousands of confidential scientific documents, many skeptical that climate change is man-made, were stolen and subsequently leaked. The incident became known as ClimateGate.
A cyber terrorist ate my hamster
Space Rogue is a graduate of L0pht Heavy Industries - one of the original and best of the old-school hacking groups. He knows a bit about hacking, hacking events – and those that never happened.
Smart grid cybersecurity gaps stem from industry failings, government disputes
The electricity industry has failed to consistently include cybersecurity features in the deployment of smart grid systems, and jurisdictional disputes have stymied government action, judged the US Government Accountability Office (GAO).
Online gamers targeted by phishers
Researchers have discovered new phishing campaigns targeted against online gamers: Trend Micro citing WOW: Mists of Pandaria, and GFI Software citing Star Wars: The Old Republic.
Researchers criticize Tridium for being 'unresponsive' to security issues
Billy Rios and Terry McCorkle, the researchers who worked with the Washington Post to uncover security gaps in Tridium’s Niagara Framework, said that Tridium has been “unresponsive” to fixing the flaws.
Cisco buys Virtuata, a California-based virtual security firm
Cisco announced yesterday that it had completed the acquisition of a little known privately held company that develops security for cloud and virtualized environments.
Pulaski Bank sues former employees for taking company data to new employers
First State Bank in Kansas opened two new mortgage offices, and recruited staff from Pulaski Bank – but Pulaski claims that staff wasn’t all they took.

FBI teams with DARPA, George Mason to fuzz test Android apps
The FBI is teaming with the Defense Advanced Research Projects Agency (DARPA) and George Mason University to perform fuzz testing on Android mobile applications.
German state buys CD of Swiss bank customers for €3.5m
Authorities in North Rhine-Westphalia, the most populous of Germany’s 16 federal states, have purchased a CD containing the private Swiss bank details of about 1000 wealthy German citizens.
50% Job leavers steal confidential company data
New details from Iron Mountain show the extent to which employees leaving employment will take confidential company data with them when they go.
FTC urges Congress to renew cross-border online scam power
A US Federal Trade Commission (FTC) official urged Congress on Thursday to reauthorize the Safe Web Act, which gives the agency power to combat cross-border online scammers.
UK ISP says Digital Economy Act is past its sell-by date
Last month Ofcom finally published its draft code for the application of the Digital Economy Act. Now UK ISP Entanet asks, “is the DEA old before its time?”
Vulnerabilities in Niagara Framework exposed
Tridium’s Niagara Framework enables millions of devices to be controlled centrally via the internet, but it also opens up vulnerabilities to attacks from hackers, according to a story by the Washington Post.
Stuxnet leak prompts US House to consider prosecution of journalists
Prompted in part by newspaper stories about the US role in the Stuxnet worm, House lawmakers are considering amending the Espionage Act to enable the prosecution of journalists who disclose sensitive national security information.
Single massive spam campaigns replace high volume spam runs
Over the last few months researchers at Trend Micro began to investigate a rise in the number of high volume spam runs – and concluded that they weren’t individual spam runs at all, but part of a single, massive spam campaign.
Mobile carriers provided more than one million phone records to police in 2011
Last year, US mobile carriers responded to 1.3 million requests from law enforcement agencies for consumers’ cell phone records, according to a report released by Rep. Edward Markey (D-Mass.).
Man in the Browser (MITB) becomes Man in the Mobile (MITMO)
MITB malware, personified by Zeus and SpyEye, has long been the bane of desktop online banking. Now Trusteer reports that MITB has migrated to Android; and calls it Man in the Mobile.



