Infosecurity Magazine Features
The Gods of Phishing
Some phishing attempts are truly ethereal – near flawless representations of official communications. Others, however, are mere mortals. And then there’s the absolutely absurd. Esther Shein visits the pantheon of scammer emails
Apple to Its iPhone Users: 'We've iPhound you'
Apple recently got itself into some hot water over the fact that its iPhones were quietly logging their users' locations to a hidden and unencrypted datafile. Steve Gold, Infosecurity's technical editor, explains the fallout...
The Rise and Fall of Online Credit Fraud
While Chip and Pin technology has certainly decreased in-store fraud, it has also re-directed criminals’ attention to online banks and shoppers. Stephen Pritchard investigates what methods cybercriminals are using to steal credit card data, and reports on how the finance sector is fighting back
Cybercrime Knows No Borders
Prosecuting cybercrime is no easy task. Even with today’s forensic capabilities, legal inadequacies in various jurisdictions, not to mention uneven enforcement, make stemming the tide a rather daunting task. Lauren Moraski reports on the complications
The World’s Dumbest Hackers
The world’s smartest hackers are often the dumbest. Danny Bradbury introduces the seven deadly sins of hacking, and finds out what happens when a hacker’s heart rules their head
Mob Mentalities: The World of Crowdsourced Software Development
Many hands may make light work, but do they also introduce more risk? Danny Bradbury explores the thorny issue of security in crowdsourced software development
Unsporting Espionage
With the 2012 Olympics fast approaching, Davey Winder takes a look at the growing problem of IP espionage in the big, expensive world of sport…
The Dirty Secrets of Green IT
The recent push to save the planet from environmental catastrophe in some quarters has dovetailed nicely with organizations’ need to pare down budgets – making for some nice PR. But, as Wendy M. Grossman demonstrates, hiding behind some ‘green’ initiatives are increased security risks
Spotlight on Cloud Computing: The Great Data Center Debate
Handing over your data to a cloud provider may appear almost irresistible from a cost perspective, but what about the security and compliance concerns? Kevin Townsend examines both sides of the argument
Spotlight on Cloud Computing: Security Risks in the Cloud
The cost savings of cloud computing versus the anticipated security risks: it’s the broken record that seems to be on continuous loop for security professionals contemplating their strategy. Ted Kritsonis examines the key considerations
Spotlight on Cloud Computing: Keeping Tabs on Your Data’s Address
Location, location, location. It’s a slogan that has deep meaning for the real estate market, but it also maintains significant relevance to the regulatory and compliance risks associated with cloud computing in the era of globalization. Stephen Pritchard investigates
Look Back and Move Forward
The beginning of a new year is often a time for predictions or, sometimes, reassertions. Drew Amorosi revisits past prognostications from Infosecurity’s editorial board to assess its foretelling prowess, examine the year that was 2010, and gather some new projections for 2011 and beyond
Joining forces to support the security profession
In late 2010, three of the world’s leading global security organisations – ISF, (ISC)² and ISACA – released a set of 12 independent, non-proprietary security principles designed to help security practitioners respond more effectively to the changing needs of organisations in today’s complex, inter-connected world.
Virtual Insanity
Virtualization offers many benefits, but it also brings some security concerns, says Danny Bradbury
Anti-virus: a technology update
Anti-virus software might be the archetypal security product, but with so many high-profile malware attacks – including Stuxnet and Zeus – is it doing its job? Kevin Townsend investigates whether anti-virus software is still relevant
Securing Your Home Office
Here’s an interesting question for all you information security professionals out there: how secure is your home IT? No, seriously. There’s no doubting that you have a handle on keeping data secure across the enterprise alright, but how clued up are you away from the office where things are actually rather different in terms of both risk and response? Davey Winder investigates
From the Eye of the Storm: 2011 Information Security Predictions
Last January, Infosecurity magazine published prognostications by the (ISC)² Advisory Board of the Americas (ABA) regarding the information security field in 2010. Unlike many who have attempted to envision the future, the ABA has gone back and reviewed the accuracy of its predictions and provided a letter grade for each. The ABA will then offer new predictions for 2011.
PCI update: Your guide to Version 2.0
The PCI Security Standards Council released the latest version of its standards in October 2010. Stephen Pritchard looks at how businesses can bring their operations in line with the new requirements
Lifting the Digital Fingerprints
No matter what your business, it’s likely the audit man (or woman) will ring your door at least once. Ted Kritsonis gets advice on how to make this experience a bit more comfortable
Cyberspace: The Fourth Arm of the Military?
The Pentagon recently declared that its US Cyber Command unit was fully operational. Danny Bradbury finds out exactly what that means