Infosecurity News
Social media makes infection inevitable
The emergence of social media as a malware attack vector means that traditional anti-virus technologies are no longer sufficient: whitelisting must now be used to supplement traditional blacklisting.
Is BYOD a new cultural revolution?
A new report from the BBC asks whether BYOD spells the end of the traditional office PC. Are we in the midst of a complete cultural revolution?
Shylock financial malware on the rise
Shylock is financial malware first detected by Trusteer last September and so named because of random excerpts from Shakespeare’s Merchant of Venice included in its binary. Trusteer now reports a significant increase in end-user infections.

Clueless in Canada: Nortel repeatedly breached over a decade
Canadian telecom firm Nortel Networks, which filed for bankruptcy in 2009, was repeatedly breached by Chinese hackers for almost a decade, according to the Wall Street Journal.
Microsoft Store India hacked
“The Microsoft Store India is currently unavailable. Microsoft is working to restore access as quickly as possible. We apologize for any inconvenience this may have caused”, is the note from Microsoft's online retail outlet.

From Redmond with Love: Microsoft ships 21 patches on Valentine’s Day
On Valentine’s Day, Microsoft is sending IT administrators a big bouquet of 21 security patches.

Anonymous spooks CIA with website attack
Fresh off its successful hack of an FBI-Scotland Yard conference call, Anonymous has claimed responsibility for taking down the US Central Intelligence Agency’s public website.
The rise – and defense – of malnets
Blue Coat Systems 2012 Security Report maps the rise and describes the persistence of the modern malnet, and offers a solution.
Trendnet home security camera feeds accessible to anyone
Insecure internet-connected home security cameras are a warning that the Internet of Things will require more than just computer security – this is a warning of things to come.
Was stolen Symantec source code behind the RSA SecurID attacks?
An Australian broadcaster asks why Symantec is guarded over the Norton AV and pcAnywhere source code that was lost to the hacker Yamatough and the Lords of Dharmaraja, while a US researcher fears he may know the reason.

Senators to introduce compromise cybersecurity legislation, with FISMA revisions
A bipartisan group of senators who authored cybersecurity legislation last year plan to introduce a compromise cybersecurity bill that will be examined at a hearing next Thursday.

Bank of America cops to credit card data breach
Bank of America has informed affected credit card customers that their information may have been compromised by a breach at an unidentified merchant.

Texas jury strikes down claim of interactive web patents
A federal jury in Texas has declared invalid patents for interactive web technology claimed by Michael Doyle and his patent holding company Eolas.
Google Wallet vulnerable to brute forcing the PIN
Security researcher Joshua Rubin has published details of his research showing a vulnerability in the Google Wallet near field communication payments system for Android.

Source code for Symantec's pcAnywhere published after failed extortion attempt
A hacker associated with an Anonymous affiliate has released source code for Symantec’s pcAnywhere security software onto the Pirate Bay file-sharing website after an apparent attempt to extort $50,000 from the security vendor.
Cybercrime – another business in the Malspace
The commercialization of cybercrime continues, with Trusteer describing what it calls ‘Factory Outlets’ for the sale of stolen user credentials.
Intrusion upon seclusion protected by Canadian court
With ‘privacy’ such an emotive and complex issue, Canadian companies should note that an action for tort (civil action) for ‘intrusion upon seclusion’ has been recognized by the Ontario Appeal Court.

Anonymous hacks police website in response to Occupy Boston crackdown
The hacktivist group Anonymous apparently gained control over the Boston Police Department's community policing website in retaliation for the police crackdown on the Occupy Boston protests.

Cybersecurity hiring declined in fourth quarter, after record third quarter
The volume of cybersecurity job ads declined in the fourth quarter in the US, compared to a four-year high in the third-quarter of 2011, according to a survey by WANTED Analytics.
Copyrighting pornography; are unsecured WiFi owners to blame?
Two US lawsuits, both involving producers of adult content, raise interesting questions: is the owner of an unsecured WiFi responsible for all downloaded material, and can you copyright pornography?



