Infosecurity News
PhishMe game educates online shoppers on Cyber Monday dangers
PhishMe, a provider of information security training software, is offering a free version of its “phishing game” to educate online shoppers about the increased threat from phishing attacks on Cyber Monday.
House bill would give DHS power to regulate firms for cybersecurity
Rep. Bennie Thompson (D-Ms.) has introduced a cybersecurity bill that would give the Department of Homeland Security the authority to require critical infrastructure firms to submit cybersecurity plans to the agency.
(ISC)² launches application security advisory board
The non-profit infosec certification body, (ISC)², has announced the formation of an international Application Security Advisory Board to address the issue of insecure software development.
EnergyAustralia to conduct trial of LTE for its smart grid network
Australian utility EnergyAustralia plans to conduct a trial of long-term evolution (LTE) technology “as an alternative wireless technology” to the WiMAX technology currently being rolled out for its smart grid wireless broadband network, according to the utility.
Fallen giant Novell to be acquired by Attachmate for $2.2bn
Software supplier Novell, once one of the most influential companies in corporate IT, is to be acquired for $2.2bn by Attachmate, a software firm owned by a group of investment companies.
Security researchers identify possible successor to Zeus trojan
A new trojan called Ares has been identified as a potential successor to the notorious Zeus trojan that has been employed to steal credentials used in millions of pounds in theft.
Security researcher Moxie Marlinspike placed on federal watch list
Leading IT security researcher Moxie Marlinspike has reportedly been placed on a US federal watch list, possibly as a result of being friends with Jacob Appelbaum, the high-profile WikiLeaks volunteer and security researcher, who was detained on an international flight into the US in July of this year.
Sophos unveils top 20 Mac malware list
Software security firm Sophos has released a list of the 20 most commonly detected types of malware for Mac users. Topping the list is Mal/ASFDldr-A, malware that comes in the form of malicious media files.
DHS sponsors state and local government cybersecurity center
The Department of Homeland Security (DHS) is launching a cybersecurity center for state and local governments that will cooperate with DHS's National Cybersecurity and Communications Integration Center (NCCIC).
Webroot says online shopping security habits getting worse
You might think that, with IT security awareness rising amongst members of the public, that the general level of security whilst shopping online might also be rising. But according to research just published, this doesn't appear to be the case.
Security researcher Moxie Marlinspike placed on US federal watch list
Leading IT security researcher Moxie Marlinspike has reportedly been placed on a US federal watch list, possibly as a result of being friends with Jacob Appelbaum, the high-profile WikiLeaks volunteer and security researcher, who was detained on an international flight into the US in July of this year.
US Air Force warns of 'devastating' effects of location-aware services
The US Air Force has warned troops that using location-aware applications on social networking sites could have "devastating" consequences for military operations.
Privileged account security examined in next Thursday's webinar
The role of privileged account security is the subject of Infosecurity's upcoming webinar, which takes place next Thursday afternoon. Speakers lined up for the event include Bob Tarzey, an analyst and director with Quocirca, as well as Richard Walters, chief technology officer with Overtis, the sponsor of the event.
DRM technology now needed for data archiving security
Digital Rights Management (DRM) technology is not only being used to protect organisation's intellectual property rights, but is now also needed in the data archiving industry, says a DRM expert.
SHA-1 crypto protocol cracked using Amazon cloud computing resources
A German hacker has successfully cracked a six-character implementation of the 160-bit SHA-1 crypto algorithm using a cloud computing resource. The hack was completed in 49 minutes at a cost of just $2.10.
Government suppliers may be ordered to open up data
Private companies may be required to open up data and make their activities answerable to Freedom of Information (FoI) law when they are contracted to work for the public sector.
Winners of the 5th Global Security Challenge Announced
The organisers of this year's 5th Global Security Challenge have announced the two winners of the competition, which means the pair of firms – classed as most promising security companies in the world – will share $500 000 investment provided by the US Department of Defense.
Kodak Gallery service being side-hacked by eBay fraudsters
Fraudsters on eBay are reportedly side-hacking the Kodak Gallery service using a fake redirect technique.
ZeuS now targeting enterprise access gateways
After plundering users' online bank accounts using stolen credentials, it seems that the continually evolving ZeuS malware is now targetting company data assets via their enterprise access gateways.
Network forensic capabilities fall well short of need
Nearly all of the security professionals surveyed by Solera Networks said they need real-time situational awareness, known as network forensics, to make their networks more secure, yet only 19% said they have this capability.



