Infosecurity News

  1. VMware? There's an iPhone app for that

    VMware has released an iPhone app designed to manage identities across both cloud and virtual server environments. Known as the Horizon App Manager, the iOS app is one of the first results of Project Horizon, which VMware announced last summer.

  2. Peak IP traffic in Europe dominated by P2P and streaming content

    The Q1 internet phenomena report from Sandvine claims to show that there is a growing appetite for on-demand applications that will continue to drive data consumption and network quality requirements.

  3. Survey finds digital distraction in the workplace costs billions

    Research just published claims to show that digital distraction is a very real problem in the workplace, with 45% of workers only working 15 minutes or less before getting interrupted.

  4. Massachusetts labor agency admits to data breach that could affect 210,000 citizens

    The Massachusetts Executive Office of Labor and Workforce Development has admitted belatedly that personal information on up to 210,000 unemployed residents may have been compromised as the result of a cyberattack.

  5. Security researcher warns on remote administration tools (RATs)

    Security researcher Brian Krebs is reporting that malware-installed remote administration tools (RATs) are starting to arrive in the cybercriminal threats arena.

  6. Average cost of data breach for Australian firms reached $2 million

    The average cost of a data breach for Australian companies was $2 million in 2010, according to a survey conducted by the Ponemon Institute on behalf of Symantec’s Australia unit.

  7. Context says Khronos fix to WebGL flaw is insufficient

    Context Information Security, which identified a flaw in the new WebGL 3D graphics standards that exposes Firefox and Chrome browsers to hackers, said that a fix proposed by vendor Khronos Group does not address the wider security issue.

  8. FBI sucks in complete internet pipes in latest surveillance evolution.

    It looks as though the FBI is quietly canning its long-standing Carnivore methodology of scanning internet users' sessions, and, where it is difficult to isolate a users' actual IP session, simply replicating and recording the entire IP data pipe.

  9. Security researcher warns over Google Doodle scareware infection

    A German security researcher has warned on a new hacker methodology of infecting users by presenting poisoned web search results as a primary hit after they click on a Google Doodle.

  10. Facebook security measures do not go far enough, say security experts

    Security experts have warned that Facebook's latest security innovations against spam e-mail and online fraud may have mixed results in effectiveness and user experience.

  11. US Attorney General Eric Holder dashes hope of UK trial for hacker Gary McKinnon

    US authorities are still insisting that self-confessed UK hacker, Gary McKinnon, face a US court, despite ongoing efforts to have the trial in the UK.

  12. Indian security agencies gear up for wide-ranging Web 2.0 surveillance

    Whilst UK and US security agencies keep their IT/communications surveillance systems and plans under carefully guarded wraps, the Indian government has taken the approach of being quite open. According to a report in the Economic Times, the Indian Centralised Monitoring System (CMS) is now being tendered for.

  13. Anonymous splinter group blamed for attack on Eidos International site

    It seems that the loose organisation of the Anonymous hacktivist group is causing problems, as reports are coming in that the web portal of Eidos International, a major gaming firm, was hacked and defaced on Wednesday night (US time) of this week.

  14. VA has failed to fix information security gaps for over a decade, says GAO

    For more than a decade, the Department of Veterans Affairs (VA) has failed to fix information security problems identified by the Government Accountability Office (GAO), as well as the VA’s Office of the Inspector General, the VA’s independent auditor, and the department itself, the GAO told a House panel.

  15. Jericho Forum professional explains challenges ahead in digital security

    James Whyte, head of IT service delivery with F&C Investments, and a member of the Jericho Forum, says that there is now a clear need for an effective - and secure - digital ecosystem in cyberspace.

  16. Zeus source code: from $100K to free in a matter of months

    Reports are coming in that the source code for Zeus, a long-running trojan that has been modified many times since the summer of 2007, is now available on several underground forums.

  17. Facebook flaws leaked data to third parties, claims researcher

    The reputation of the apparent cybercriminal's playground that is Facebook took another battering this week after a Symantec researcher revealed that as many as 100,000 Facebook applications are leaking data to third parties.

  18. Theft of Michaels' customer card numbers extends nationwide

    The theft of credit and debit card numbers from PIN-pad tampering at Michaels stores in the Chicago area extends nationwide, the company admitted this week.

  19. Canadian government is vulnerable to WikiLeaks-type data breach, report warns

    The Canadian government is vulnerable to a security breach similar to the US government’s WikiLeaks snafu that resulted in the leak of hundreds of thousands of sensitive documents, concluded an internal government report.

  20. Alarm bells sound on Microsoft acquisition of Skype

    Microsoft's acquisition of Skype for $8.5 billion has not gone down well in some quarters, with some experts questioning the wisdom of allowing the Redmond giant access to such a massive unified communications service.

What’s Hot on Infosecurity Magazine?