Infosecurity News
Cyber-Related Consumer Concerns Jump More Than 20 Points
The Consumer Risk Index from Travelers shows cyber-crime moving from the fifth-ranked to the third-ranked concern overall.
Google Bins Yellow Triangle to Simplify Chrome Security
Too many security states for users to learn, says Mountain View
NCA Warns £20 Million Dridex May Have Infected Thousands
Crime agency says it has already made one ‘significant arrest’
Governments See Cyber as a Confusing Weapon of War
Post-Stuxnet, cybersecurity has become a common weapon of war—but big obstacles remain when it comes to determining the rules of engagement.
Inside the City of LA's ISOC Project
The $1.86 million project is focused on centralizing and sharing threat intelligence and situation awareness.
Kevin Mandia: Nation-State Cyber Espionage Becomes the Norm
Military-grade cyber-attacks have become the norm, necessitating a transition to better global cooperation by government.
Japan’s Cybercriminals Request Payment in Gift Cards
Trend Micro report highlights a criminal underground in its infancy
Cyber-Insurance Premiums Rocket
Insurers are also raising deductibles and limiting the amount of coverage to $100 million for high-risk industries, like retail and health insurance.
Blue Coat Expands Encryption Consortium
New members include eSentire, Gigamon, LogRhythm, ManagedMethods, Symantec, TopSpin Security and Trend Micro.
China Cuffs Hackers at Request of US Officials
Signs of greater co-operation between superpowers
Lyft Denies CTO Involvement in Uber Data Breach
Rival companies in legal tussle
Dow Jones Hacked, Affecting Thousands
Hackers manipulated a subscription system to steal personal contact information from August 2012 until at least July 2015.
Quarter of USPS Staff Clicked on Phishing Link in Audit
Exercise highlights importance of training and awareness programs
Webcam Voyeur Spied on Friends via RAT
Leeds man gets 20-week suspended sentence
UK Doctors Routinely Send Sensitive Patient Info by Text
Privacy fears after BMJ survey reveals dangers of BYOD
Moker RAT Has Unusual Characteristics
It can operate as a local access trojan, without a command & control server, receiving its commands locally, through a hidden control panel.
Samsung Pay Provider Hacked Secretly for Months
China suspected of grabbing IP from LoopPay
Malicious Android Adware Kemoge Roots Victim Devices
FireEye warns users not to click on suspicious links
Iran Threat Group Uses Fake LinkedIn Network to Target Victims
A network of fake LinkedIn profiles has been created to help the threat actors target potential victims through social engineering.
Cisco Snares Angler Cybercrime Group Worth $30m Annually
Talos group disrupts proxy network making a fortune from ransomware