Infosecurity News

  1. Delaware man fined $210 000 for selling pirate software online

    Whilst eBay and other major internet auction sites appear to have cleaned up their acts on the pirate software front, smaller sites are still letting some postings through.

  2. Linux, Symbian, Android, Apple or Blackberry? A tough choice for CIOs

    The recent launch of nine high-specification mobile phones that use the Mobile Linux operating system (Limo) will add fuel to an already overheated market.

  3. Unauthorised local authority staff access to personal data is inevitable

    Reports in Computer Weekly that a number of local authorities are sacking or disciplining staff for viewing personal data on the Department for Work and Pension's Customer Information System (CIS) comes as no surprise, says Cyber-Ark, but merely serves to highlight the need for highly privileged access to this kind of data.

  4. Web-based malware attacks soaring says ScanSafe

    In its second quarterly report on IT security threats of 2008, software-as-a-service (SaaS) specialist ScanSafe reported that web-based malware had surged by over a third when compared to the first quarter of the year.

  5. Campaign Monitor hit by hacker server incursion

    Campaign Monitor, the Australia-based email marketing software developer, has warned users of compromise to its servers that took place over last weekend.

  6. Islamist hackers block Kosovo website

    The problem of religiously-motivated hacker attacks raised its ugly head again this month with an attack on the Express newspaper in Kosovo. Newswire reports suggest that Islamist hackers attacked the paper's website using a combination of simple malware and distributed denial of service (DDOS) attack vectors.

  7. Microsoft warns over DDOS security vulnerability in Windows ASP.NET

    Microsoft has issued a security note about a flaw in Windows ASP.NET that it says could allow a DDOS security situation.

  8. The iPod and iPhone could be used for hacking

    Applications on the Apple iTunes website are arguably what makes the iPhone so popular in mobile phone circles, but a growing number of users are unlocking (jailbreaking) their iPhones, for the simple reason that it opens up the mobile to third-party applications. This means the iPod and iPhone could be used for hacking.

  9. Hold software providers accountable for IT failures

    Regulation could protect businesses and governments from poor IT implementations that have cost billions of dollars. But at present, software is generally shipped with a disclaimer which states that the manufacturer does not guarantee it will work, unlike regulated industries such as pharmaceuticals where the supplier is held accountable for a failure in manufacturing.

  10. Competition will drive down NHS IT costs, say Conservatives

    The Conservative party is to reveal plans to cut NHS IT spending by scrapping the government's planned central database for medical records.

  11. Fibre optic networks not secure without encryption

    Fibre optic networks are not secure enough to transmit information that has not been encrypted, according to a recent report from IDC Research.

  12. UK national ID card cloned in 12 minutes

    The prospective national ID card was broken and cloned in 12 minutes, the Daily Mail revealed this morning.

  13. Managed wireless security set to hit $1 billion by 2014

    A study just released by ABI Research predicts a period of healthy growth for managed wireless security solutions, with growth averaging 27% a year for the period 2008 to 2014.

  14. Does weak cloud password security mean local storage is best?

    Hard on the heels of researchers at last week's Black Hat security briefings showing how easy it is to recover third party passwords on Amazon's EC2 and Microsoft's Office Online services, Andy Cordial, Origin Storage's managing director, said that this highlights the fact that local storage technology is far more secure than the cloud.

  15. WatchGuard acquires BorderWare in private transaction

    Seattle-based WatchGuard Technologies - the unified threat management (USM) security vendor - has announced plans to buy privately-held BorderWare Technology, which employs around 90 staff, for an undisclosed sum.

  16. Companies invest in IT, but do not measure IT value

    Despite 30% of IT security companies increasing their investments in IT this year, fewer than half have a shared understanding of IT value across the enterprise and two-thirds fail to fully measure it, according to ISACA.

  17. SquirrelMail open source email project hacked

    It now seems that the hacking of the servers of the SquirrelMail open-source email project in late June may have been worse than originally reported.

  18. Zeus botnet traced to Latvian operation

    Researchers have been busy over the last few days tracing where the Zeus botnet is being controlled from, following investigations by the University of Alabama in the US, which tracked down the Zeus Bot virus to a raft of fake internet postcards circulating on the internet.

  19. Arbor Networks shows how Iran filters and blocks internet traffic

    Arbor Networks has published internet bandwidth usage figures from June and July that make fascinating reading if you ever wondered how less democratic governments such as Iran filters and blocks internet traffic for their citizens.

  20. US credit reporting system flawed claims information security researcher

    Clever hackers are exploiting a number of loopholes in US credit reporting systems to substantially improve their credit rating and so gain access to zero percent loans and low-cost credit cards, an information security researcher said over the weekend.

What’s Hot on Infosecurity Magazine?