Infosecurity News
Chronopay co-founder Pavel Vrublevsky refused bail in Russia
Reports are coming in that Pavel Vrublevsky, the co-founder of Chronopay, the Russian e-money service used a large number of web sites in the former Eastern bloc, has been refused bail.
Hackers down landline and cellular systems in Gaza and West Bank
Unknown hackers are reported to have downed the landline and cellular networks n Gaza and the West Bank, the Palestinian telecoms minister has announced.
ISACA research shows bring-you-own-device to workplace trends rising rapidly
Research from ISACA claims to show that the number of organization's allowing staff to bring their own devices to the workplace is increasing.
More than a third of US companies are not prepared to fend off APTs
More than one-third of US companies are poorly prepared for advanced persistent threats (APT), according to a report by the Enterprise Strategy Group (ESG).
Android Dolphin HD browser hit by major security problems
Dolphin HD, an advanced web browser for the Android platform, is reported to be relaying details of web sites accessed on the device it is installed on to a remote server.
Secunia joins the bounty-for-bugs bandwagon
Secunia, the independent IT security research agency, has become the latest to start rewarding researchers for information on security vulnerabilities. The firms joins the likes of Barracuda Networks and Google's Chrome operation in this regard.
CNAS report recommends new approach to US national security
The Center for a New American Security (CNAS) has released a report recommending that the US Department of Defense adapt its national security strategy to embrace the new science of predictive failure. At the same time, the report also suggests that the DoD needs to raise its game in terms of intelligent predictions.
Check Point acquires Israel's Dynasec to boost GRC offerings
Check Point has announced it is in the process of acquiring Dynasec, a privately held Israeli compliance solutions firm that was founded back in 2004. Sources suggest the purchase price is in the region of $10 to $20 million, although no figures have been confirmed by either party.

Researcher explains how fraudulent drop-ships allow criminals to monetize card credentials
A leading security researcher has been analyzing how cybercriminals monetize their stolen credit and debit card credentials and discovered that drop-shipping is one of the most common methods of fraudulently misusing card information harvested from various sources.

Malaysia backs global cybersecurity group to share threat data
Malaysia has set up the Global Cyber Security Alliance (GCSA) to encourage sharing of cyber threat information among nations.

Firms lose 12% of their brand value from data breaches, survey finds
Companies that experience a major data breach lose on average 12% of their brand’s value, according to a survey conducted by the Ponemon Institute and sponsored by Experian Data Breach Resolution.

Stop! Don't pick up that apparently lost iPhone!
A Novato, Calif., woman thought she was doing the right thing by picking up an apparently lost iPhone 4 in her shopping cart, taking it to her son's home and calling the phone's owner to tell her she could collect the handset.
The real world consequences of an APT hack
Security researcher Brian Krebs has detailed an interesting analysis of how an APT attack ended up with Chinese hackers effectively running amok on a hedge fund's IT resource – and how the company dealt with the problem.

Hackers disrupted US government satellites, says report
Hackers, perhaps from China, interfered with two US government satellites during 2007 and 2008 by penetrating a ground station in Norway, according to a report being issued by a congressional commission next month.

TDL4 botnet may be available for rent
ESET's senior research fellow David Harley says that, while his team of researchers have been tracking the TDL4 botnet for some time, they have noticed a new phase in its evolution.

Solera research director spots a hybrid spear phishing attack
Andrew Brandt, The newly-installed director of threat research with Solera Networks, has been analyzing what appears to be a hybrid spear phishing attack against a colleague and revealed the effort that goes into making these targeted attack emails look genuine.

Jericho Forum talks about identity security strategies
At the RSA Europe event earlier this month, Infosecurity got a chance to catch up with Paul Simmonds, a board member of the Jericho Forum.

Application vulnerability ranked as key threat by 72% of IT security professionals
Research just released by (ISC)² claims to show that application vulnerability was ranked as the number one threat by more than 72% of IT security professionals.

Duqu should act as an alarm for IT security professionals
Responding to Symantec – and McAfee's – reports last week about the 'Son of Stuxnet' worm appearing and harvesting information from industrial control systems, Venafi says the Duqu malware is definitely a major security threat.
Barnaby Jack hacks diabetes insulin pump live at Hacker Halted
At the Hacker Halted conference in Miami, Florida, McAfee research architect, Barnaby Jack, demonstrated how to hack into an insulin pump live in his presentation titled ‘Life threatening vulnerabilities’.



