Infosecurity News
Whitehall black-on-black text security blunder reveals info on multiple websites
An elementary security error involving the use of black text on a black background with redacted security documents published on the web effectively made the IT prowess of the Ministry of Defence, and other government departments, a laughing stock over the weekend.
Linkedin social engineering test snares 68% of users
Trusteer, the in-browser security specialist, recently conducted a honeypot social engineering test on 100 users of LinkedIn, with 68% of users potentially infecting themselves.

Network access control, not perimeter security, should be priority, says Cyber-Ark exec
Organizations are wasting money beefing up security at the perimeter when they should be focusing on securing access within the network, said Adam Bosnian, executive vice president Americas and corporate development at Cyber-Ark Software
Enterprises ignore cybercrime trends at their peril, says security researcher
Cybercriminals know the value of data better than the organizations they are targeting, according to a security strategist who studies hacker behavior.
Enterprises ignore cybercrime trends at their peril, says security researcher
Cybercriminals know the value of data better than the organisations they are targeting, according to a security strategist who studies hacker behaviour.
McAfee, Siemens team to combat critical infrastructure threats
Information security firm McAfee and industrial giant Siemens are teaming to improve security against malware, such as Stuxnet, that targets industrial control systems running critical infrastructure protection.
Interview: William Barker, chief cyber security advisor, NIST, Dept. Of Commerce
The inaugural World Cyber Security Technology Research Summit was held at Queen's Centre for Secure Information Technologies (CSIT) in Belfast in March. Of all the delegates that Infosecurity had the pleasure of speaking with, William Barker, chief cyber security advisor NIST, has arguably the most impressive CV.
Android/iPhone app allows spoofed caller ID calls to be made
A new app for Google Android and jailbroken iPhones allows users to make calls with their own choice of caller ID. Known as SpoofPro, the app routes calls via the company’s servers in the US, allowing any caller ID to be generated.
Feds take down Coreflood botnet
The Department of Justice (DoJ) and the FBI announced this week the shutdown of the Coreflood botnet that infected more than 2 million computers worldwide with keylogging malware designed to steal financial information from victims.
Cyber-Assisted Physical Attacks are Here and Now says John Bumgarner, US Cyber Consequences Unit
At the World Cyber Research Summit in Belfast on March 16th, Infosecurity’s Eleanor Dallaway had the opportunity to interview John Bumgarner of the US Cyber Consequences Unit.
Report recommends removing admin rights from end users
Research just released claims that in order to increase security on an organisation's network, managers should remove admin level rights for end users.
Libyan rebels successfully hack the country's eastern cellular network from the inside
A group of "expatriate executives and engineers" have quietly wrested control of Libyan's cellular network in the rebel-held areas of the country, allowing officials with the transitional government in the East to communicate wirelessly with each other once again.

Organizations deploying smart devices without understanding security risks
Close to half of IT professionals surveyed by smart device security firm Mocana said that they did not believe their organizations could adequately manage the security risks posed by smart devices.
DARPA working on full disk encryption for iPhone and Android
The US military's Defense Advanced Research Projects Agency (DARPA) has announced it is researching into the area of full disk encryption (FDE) on Google Android and Apple iPhone handsets.
Justice Department questions Google's FISMA certification claims
The US Department of Justice said in court documents that the Google Apps for Government cloud-based IT suite was not certified under the Federal Information Security Management Act (FISMA), despite claims by Google that it was.

Sony settles code cracking legal spat with George Hotz
Sony Computer Entertainment America has settled its PS3-related legal spat with the infamous code cracker George Hotz. Also known as Geohot, Hotz is well known for being the first person to jailbreak the Apple iPhone in his mid-teens.
Barracuda Networks website hit by SQL injection attack
Barracuda Networks has become the latest IT security vendor to be hit by an SQL injection attack, but the company has moved swiftly to mitigate the fallout from the attack, as well as confirming that all active passwords for applications remain secure.
ATM hacks: can you trust external cash machines any more?
It looks like cybercriminals have moved their ATM skimming game to its logical conclusion and developed wireless plus miniaturised cash machine add-ons that are indistinguishable from the real thing.
ICO finds NHS Liverpool Community Health breached Data Protection Act
The medical history of 31 children and their mothers was lost by NHS Liverpool Community Health during a premises move in October last year.
iPhone keylogging hackware arrives
The first Apple iPhone keylogging 'utility' has reportedly arrived in the security industry. Ostensibly for legitimate use, iKeyGuard is also being discussed as potential darkware.



