Infosecurity News

  1. Google Bins Yellow Triangle to Simplify Chrome Security

    Too many security states for users to learn, says Mountain View

  2. NCA Warns £20 Million Dridex May Have Infected Thousands

    Crime agency says it has already made one ‘significant arrest’

  3. Governments See Cyber as a Confusing Weapon of War

    Post-Stuxnet, cybersecurity has become a common weapon of war—but big obstacles remain when it comes to determining the rules of engagement.

  4. Inside the City of LA's ISOC Project

    The $1.86 million project is focused on centralizing and sharing threat intelligence and situation awareness.

  5. Kevin Mandia: Nation-State Cyber Espionage Becomes the Norm

    Military-grade cyber-attacks have become the norm, necessitating a transition to better global cooperation by government.

  6. Japan’s Cybercriminals Request Payment in Gift Cards

    Trend Micro report highlights a criminal underground in its infancy

  7. Cyber-Insurance Premiums Rocket

    Insurers are also raising deductibles and limiting the amount of coverage to $100 million for high-risk industries, like retail and health insurance.

  8. Blue Coat Expands Encryption Consortium

    New members include eSentire, Gigamon, LogRhythm, ManagedMethods, Symantec, TopSpin Security and Trend Micro.

  9. China Cuffs Hackers at Request of US Officials

    Signs of greater co-operation between superpowers

  10. Lyft Denies CTO Involvement in Uber Data Breach

    Rival companies in legal tussle

  11. Dow Jones Hacked, Affecting Thousands

    Hackers manipulated a subscription system to steal personal contact information from August 2012 until at least July 2015.

  12. Quarter of USPS Staff Clicked on Phishing Link in Audit

    Exercise highlights importance of training and awareness programs

  13. Webcam Voyeur Spied on Friends via RAT

    Leeds man gets 20-week suspended sentence

  14. UK Doctors Routinely Send Sensitive Patient Info by Text

    Privacy fears after BMJ survey reveals dangers of BYOD

  15. Moker RAT Has Unusual Characteristics

    It can operate as a local access trojan, without a command & control server, receiving its commands locally, through a hidden control panel.

  16. Samsung Pay Provider Hacked Secretly for Months

    China suspected of grabbing IP from LoopPay

  17. Malicious Android Adware Kemoge Roots Victim Devices

    FireEye warns users not to click on suspicious links

  18. Iran Threat Group Uses Fake LinkedIn Network to Target Victims

    A network of fake LinkedIn profiles has been created to help the threat actors target potential victims through social engineering.

  19. Cisco Snares Angler Cybercrime Group Worth $30m Annually

    Talos group disrupts proxy network making a fortune from ransomware

  20. VASCO to Acquire Silanis

    Silanis provides electronic signature (e-signature) and digital transaction solutions used to sign, send and manage documents.

What’s hot on Infosecurity Magazine?