Infosecurity News
Jericho Forum unveils best practice identity commandments
The Jericho Forum has taken the wraps off a set of best practice identity principles - enshrined in a set of commandments - which seek to lay down the ground rules for IT security professionals when dealing with the complex world of digital identities.
Facebook flaws leaks millions of data elements to third parties claims researcher
The reputation of the apparent cybercriminal's playground that is Facebook took another battering this week after a Symantec researcher revealed that as many as 100,000 Facebook applications are leaking data to third parties.
Organizations not equipped to prevent DDoS attacks, DNS failures
Many organizations are not equipped to prevent and respond to web infrastructure failures caused by distributed denial of service (DDoS) attacks and Domain Name System (DNS) failures, according to research commissioned by VeriSign.
WebGL opens browser to attacks that can disable computer
A researcher at the Context Information Security consulting firm has identified a number of serious vulnerabilities in the new WebGL 3D graphics standard enabled by default in Firefox 4 and Google Chrome browsers, and as an option in the Apple Safari browser.

FERC wants more power to protect electric grid from cyber attacks
The Federal Energy Regulatory Commission (FERC) is looking to expand its authority to protect the electrical grid against cyber attacks.
Sony Ericsson posts info on hacking Xperia Android phones
In a move that has caused raised eyebrows in the smartphone industry, Sony Ericsson has posted detailed information on how to hack its Xperia range of Android smartphones.
TalkTalk introduces first ISP-level malicious URL filtering service
TalkTalk, a third-party telco and broadband supplier, has launched the UK's first ISP-level broadband security service.
Context discovers security flaws in WebGL technology
Context Information Security claims to have discovered a range of security flaws in WebGL technology, a web-based extension to the JavaScript programming language that allows 3D graphic images to appear with users’ web browsers.
Curiosity kills the cat as hackers use new infection techniques
Hackers appear to be using social networking and news trending topics, judging from a recent analysis from Luis Corrons, technical director with Panda Security, who notes that the death of Osama bin Laden and the Royal Wedding have been used as lures in the last few weeks.
LastPass hits the master password change button after alert
LastPass, the popular online password management service, has started the lengthy process of forcing members to undergo master password changes following anomalies on its inter-server data logging systems.
FBI says audit does not reflect cyber investigation capabilities
The FBI says an audit finding insufficient national cybersecurity investigation skills does not reflect current expertise and results.
Sony says evidence suggests Anonymous was behind massive data breach
Sony said that it appears the massive data breach affecting 100 million of its PlayStation Network (PSN) and Sony Entertainment Online (SOE) customers may have been carried out by the hacker group Anonymous, although the group denies responsibility.
Android trojan infection methodology explained
Hard on the heels of a welter of Google Android malware stories, data security specialist Imperva says its research team has discovered how cybercriminals are using Android apps to infect users with trojans.
Fortinet threat report shows CoreFlood botnet infecting 2.3 million users
The latest monthly threat report from Fortinet claims that 2.3 million PCs were infected by the CoreFlood botnet, which was dismantled recently by an FBI sting operation. In addition, the report claims to show that Russian domain pharma sites now dominate the spam selling scene.
LastPass hits the master password change button after alert
LastPass, the popular online password management service, has started the lengthy process of forcing members to undergo master password changes following anomalies on its inter-server data logging systems.
Companies can take steps to fix flaws without patches
Companies can take steps to mitigate vulnerabilities without using patches or other expensive remedies, said Marc Maiffret, chief technology officer at eEye Digital Security.
Sony admits to week delay in notifying public about data breach
In a letter to Congress, Sony admitted to a delay of a week in providing information to the public, law enforcement, and state regulatory authorities about the hack of its servers, which exposed the personal information of 100 million customers.
Check Point reveal top security challenges for 2011
At the Check Point Experience in Barcelona on 4th May 2011, John Vecchi, head of product marketing for Check Point, shared his thoughts on the top information security trends and challenges for 2011.
APT-driven zero-day attacks tapped by RSA hackers says researcher
It looks as though cybercriminals are starting to get to grips with the advanced persistent threats (APT) attack strategies first outlined by Stonesoft late last year. And, says one security researcher, they are linking the strategy with zero-day attacks for maximum effect.
First dynamic firewall in beta test for Android
Following on from the release of the first full disk encryption app for Google Android back in March, Whisper Systems is now also developing a dynamic firewall app for the smartphone platform.



