Infosecurity News

  1. New malware generates reverse text in file names

    A security researcher has warned of a new type of malware that reverses and hides the 'exe' in the name of a file, making an exe file appear, for example, as a text or doc (document) file.

  2. Researcher discovers distributed bitcoin cracking trojan malware

    A Symantec security researcher is reporting the discovery of a trojan that infects and adds users' computers to a processing swarm designed to brute force decrypt the bitcoin electronic currency system, generating as much as $150.00 per infected computer every month.

  3. SANS Institute's NetWar challenge takes on the US military

    The SANS Institute has expanded its NetWars challenge, which tests information security skills of IT professionals, to include the US military, noted Ed Skoudis, director of the SANS NetWars project.

  4. Infosec expert traces and recovers his laptop - stolen in the London riots - using Google Street View WiFi data

    A technical expert with HP-ArcSight says he was able to track and report his Macbook Pro laptop – stolen in last week's London riots - and assist the police in returning the computer.

  5. Security researcher warns on smartphone juice-jacking risk

    A leading security researcher has warned smartphone users of the risk they run by charging their handset at one of the growing USB-linked 'power stations' that are popping up at airports, shopping malls and other locations across the US, Canada and Europe.

  6. UK IT profession could suffer as postgraduate course fees face huge rises

    The UK IT profession could suffer as a result of the soaring cost of postgraduate courses on the back of rises in the fees for undergraduate studies.

  7. Thales develops on-SIM mobile wallet authentication and encryption technology

    Thales has developed what it claims is the industry's first cryptographic technology capable of running in the memory of a cellular phone's SIM card, meaning that the secure m-wallet function can operate wholly on the SIM card, interacting with secure servers across cellular data channels.

  8. Imperva says hackers are tapping Google's powerful search engine features once again

    Data security specialist claims that cybercriminals are tapping the powerful search features that Google offers, generating more than 80,000 daily queries. This, the firm says, allows the hackers to conduct a significant amount of cyber reconnaissance at little of no cost to themselves.

  9. Source code for SpyEye trojan leaked onto forums and filesharing services

    It seems that the source code for SpyEye – the sister malware to Zeus – has been released on a number of file-sharing sites, as well loaded onto the file areas of a number of darkware forums. The move follows the `sharing' of the source code of Zeus earlier this year, Infosecurity notes.

  10. 2011 UK Infosecurity Virtual Conference – Confirmation of Conference Programme

    We are pleased to announce the details for our Infosecurity 2011 UK autumn virtual conference, to be held on 27th September 2011. This one-day event will bring together a series of topical keynote sessions direct to your computer and gives you the flexibility to learn about the latest information security trends and challenges from wherever you are in the world.

  11. Elite hackers create RankMyHack.com

    A group of hackers have set up a leader board website called - appropriately enough - RankMyHack.com, under which elite hackers can post information on their latest hacks and allow their peers to rank their network and system incursions.

  12. Black market sales emails are Chinese scams says CA researcher

    If you've started receiving emails offering you all manner of electronics and similar goods at significantly below market prices in the last few weeks, you are not alone, as a Computer Associates senior security researcher says the emails are widespread. But far from being offers for counterfeit goods, as many surmise, they are almost certainly scams.

  13. Anonymous hackers hit San Francisco transport site in protest at mobile blocks

    Hacking group Anonymous has defaced a website of San Francisco's rail transport company.

  14. GCHQ to help police catch rioters who used social networks to coordinate violence

    The Government Communications Headquarters (GCHQ), which is responsible for key aspects of the UK's cybersecurity, and MI5 are working with police to hunt rioters by trawling social networks.

  15. SSL VPNs pose network security risks

    The use of secure sockets layer (SSL) virtual private networks (VPNs) opens up networks to security risks, according to a white paper by NCP Engineering.

  16. Android malware levels steadily increasing

    A researcher with ESET says that his firm has identified that the volume and incidence of malware seen on the Android smartphone and tablet platform are increasing. Cameron Camp, from the East European IT security vendor, says malware authors are ramping up their output to account for the take-up of Android devices amongst end users.

  17. New DDoS defence technology launched

    Simwood has launched a defence technology that it claims can be used defend against distributed denial of service (DDoS) attacks.

  18. Android malware eavesdrops on users, tapping Google+ as disguise says researcher

    A threats analyst with Trend Micro is reporting that another piece of Android malware – from the Nickispy family – has been spotted in the wild. As with other versions of Nickispy, the malware eavesdrops on users and data sessions on the infected mobile device.

  19. Major stolen card credentials site hacked

    Whilst carder forums and other types of illegal card credential exchanges are numerous on the darker side of the internet, security researcher Brian Krebs has revealed that a major vendor of stolen card details has been hacked, presumably by his/her fellow cybercriminals.

  20. LinkedIn bows to pressure over “social ads” privacy concerns

    LinkedIn has responded to criticism of its "social ads" feature over its use of members' names and photos in advertisements on its website.

What’s Hot on Infosecurity Magazine?