Infosecurity News

  1. Internet 'kill switch' reports highlight need for contingency planning, say Infosecurity Europe organisers

    Reports that President Obama is formulating plans to develop an internet 'kill switch', following infrastructure issues raised during the aftermath of the Egypt internet shutdown, should be viewed as a red flag to IT security professionals.

  2. Russian police squash major pharmacy spam campaign

    It seems that Russian police are working steadily to crush the rising tide of so-called pharma spam campaigns, with one security researcher having heard about a raid on the hackers behind the Rx-Promotions scheme.

  3. Zeus malware appears with fake digital certificate

    A German IT security vendor has discovered a version of Zeus that has been signed with its own digital certificate – a move that could fool some corporates into installing the malware thinking it is a legitimate piece of code.

  4. Credant embraces the cloud with on-net policy-based encryption

    Credant Technologies has started testing its data encryption technology in the cloud with a select number of beta test clients, promising other cloud security offerings in the near future.

  5. Security researcher discovers Rapidshare flaw

    A security researcher has detailed how a flaw has been discovered and exploited on Rapidshare, the world's largest file-sharing service.

  6. Oracle fixes 21 flaws in Java SE, Java for Business

    Oracle is fixing 21 flaws in its Java SE and Java for Business products in its February critical patch update issued this week.

  7. Insecure software plays key role in creating cybersecurity vulnerabilities

    Research just published claims to show that a failure to invest in secure software delivery is placing businesses at risk

  8. Free risk analysis/management app released for iPhone, iPad and iPod touch

    Citicus, a corporate risk management and compliance specialist, has released a risk analysis/management app for the iOS range of Apple devices – the iPhone, iPad and iPod touch.

  9. Intergrity and honesty top list of most important federal government cybersecurity skills

    Integrity and honesty top the list of skills needed for the current and future federal cybersecurity workforce, according to an Office of Personnel Management (OPM) survey.

  10. End-of-life IT assets pose serious security risk to most firms

    Research just published claims that end-of-life IT assets - especially portable devices like smartphones and laptops - pose a serious data security threat to many firms.

  11. Pharmacy spam campaign hijacks Google brand name

    A new pharma spam campaign uses the Google brand. More than 250 similar blog-related campaigns have been tracked in the last two days.

  12. West Virginia hospital exposed personal data on 3,655 patients

    The West Virginia Attorney General’s Office announced that personal information of 3,655 patients at the Charleston Area Medical Center (CAMC) was placed onto a publicly available website.

  13. RSA 2011: Application whitelisting comes to the consumer

    Application whitelisting technology is hardly a novel concept – in fact, the technology has been available to enterprises for some years now. But, as GlobalSCAPE executives told Infosecurity at this year’s RSA Conference in San Francisco, application whitelisting for consumers is just around the corner.

  14. BBC 6 Music and 1Xtra websites infected by Phoenix exploit kit hack

    Visitors to two websites operated by the BBC were injected by malicious code earlier this week, opening up users to attacks by hackers, claims Websense.

  15. Lumension releases beta version of its Application Scanner v2.0

    Lumension has released a beta version of its free Application Scanner v2.0 that scans executable files and identifies all applications within the endpoint environment, along with its Endpoint Intelligence Center (EIC) that consolidates malware, vulnerability, patch, and application information with relational cloud-based intelligence.

  16. RSA: Fake AV Companies Making More Money than Security Vendors

    Having spoken on the ‘Public, meet private: Lessons learned in chasing cyber crooks’ panel at the RSA 2011 conference in San Francisco, Pedro Bustamante, senior research analyst at Panda Security, tells Infosecurity’s Eleanor Dallaway why geography is obstructing cyber legal justice

  17. Education programs are hardly a security ‘silver bullet’

    User education is often touted as a cornerstone of any effective IT security program. But as Jack Daniel, community development manager with internet security firm Astaro contends, not every organization will reap benefits from educating its end-users.

  18. RSA 2011: Terrorist groups pose most dangerous cyber threat

    While nation-states actively attempt to exploit the networks of the US government, critical infrastructure, and commercial networks, US Deputy Secretary of Defense William Lynn told the RSA Conference audience that terrorist groups are inevitably more likely to fire the most severe type of destructive cyber warfare salvos.

  19. Real-world ATM skimming techniques revealed

    Security researcher Brian Krebs has had a long-standing interest in the increasing problem of ATM skimmers - fraudsters who install hidden gadgets on cash machines with the intention of ripping off bank card customers. And he has posted an in-depth analysis of one such scam earlier today.

  20. Panda Security launches 'Internet in Safe Hands' campaign

    Panda Security has launched a senior citizens' safer internet campaign, with the aim of educating people over 60 on how to make their internet activities more safe.

What’s Hot on Infosecurity Magazine?