Infosecurity News

  1. Instagram Set to Switch On Two Factor Authentication

    Photo sharing network finally gets serious about account security

  2. Dark Web Experiment Shows How Hackers Use Stolen Credentials

    With a stolen Gmail username and password combo, hackers showed that they could access bank accounts and more.

  3. IoT Woes: SimpliSafe Home Security System Opens to Thieves

    All keypads and base stations will need to be replaced in order to secure the system.

  4. Dridex Gang Gets ‘Locky’ with New Ransomware Campaign

    Researchers discover new malicious macro-based threat

  5. Glibc Flaw Affects Linux Machines and IoT

    A vulnerability in the GNU C Library could result in remote code execution, and may affect most Linux machines.

  6. Spear Phishing Incident Average Cost is $1.6M

    84% of respondents experienced spear phishing attacks that penetrated their security solutions.

  7. Mazar BOT Can Erase Android Phones

    The malware also can read SMS messages, including authentication codes sent as part of two-factor authentication mechanisms.

  8. Anonymous Hacks South African Government

    1,000+ easy passwords leaked in #OpAfrica hacktivist effort.

  9. Patients Sent Away as Ransomware Hits Hollywood Hospital

    Malware infection causes chaos

  10. Enisa: Backdoors Will Undermine Society and Industry

    EU security agency in favor of strong and trustworthy crypto

  11. UK Teen Arrested Following CIA Director Hack

    Boy cuffed after individual breached John Brennan’s email account last year

  12. Hexadite Gains HP Support in Series A Funding

    The company plans to use the funds to accelerate the push behind its automated cyber security incident response, Hexadite AIRSÔ.

  13. Skype Hit in Latest Malvertising Push

    The latest campaign shows that non-browser-based applications can also be hit.

  14. Online Dating Fraud Warning Ahead of Valentine’s Day

    Love birds beware – the scammers are ready and waiting

  15. Deloitte: Cybersecurity Moves to the Offensive

    High-speed access to abundant datasets, innovative automation and evolving forensic and incident response tools are driving increasing sophistication.

  16. Leaky Mobile Apps Expose Personal Info for Millions

    In an analysis of more than 400,000 apps available from the Google Play store, the report found that overall, 10.8% of all apps leak sensitive data over the network.

  17. Faux Insiders Represent the Greatest Cyber-threat to Organizations

    Perpetrators often use social engineering techniques to gain insider access—a much easier job for hackers than writing zero-day exploits.

  18. Dyre Trojan Silenced After Moscow Raid

    Police raid linked to malware disruption

  19. VTech Tells Customers to ‘Assume Responsibility’ Following Breach

    Electronics firm says customers use its products at their own risk

  20. Security Pros Struggling with Increasing Workplace Pressure

    Trustwave report claims projects are being rushed out too soon

What’s hot on Infosecurity Magazine?