Infosecurity News

  1. Edinburgh Council Web Attack Breaches Over 13,000 Email Addresses

    Users warned to expect follow-up phishing attacks

  2. Mysterious Hacking Group Wild Neutron Returns to Wreak Havoc

    It's using an unknown Flash Player exploit to infect companies and private users around the world and steal sensitive business information.

  3. Over Half of UK Small Firms Open to Cyber-Attack – Report

    CSID claims businesses are concerned, but failing to act

  4. Explosive Gunpoder Malware Evades All Android AV Products

    Palo Alto Networks claims security tools classify it as adware

  5. Adobe to Patch Hacking Team Flash Player Bug

    Flaw has been exploited in the wild after being disclosed in Sunday’s data dump

  6. NSA Search Engine Taps Into Global Comms to Intercept, Well, Everything

    The XKeyscore search engine hoovers up vast amounts of private communications information, including 700,000 voice, fax and video files every day.

  7. OpenSSL to Patch Critical Mystery Bug on Thursday

    Unfortunately, like Heartbleed, the mystery bug is likely to be a big deal. OpenSSL is a basic component of a wide swath of the web.

  8. Trend Micro Teams Up with NCA to Bust Cyber-criminals

    Security giant will form virtual team with the agency after MoU is signed

  9. Hacking Team Hacked in 400GB Breach

    Controversial intrusion software company on the receiving end

  10. AirLive IP Surveillance Cameras Allow Remote Access

    The user needs to specify in the configuration of the camera that HTTPS is used for communications—this is not enabled by default.

  11. Fake BatteryBot Pro App Serves Malware, Can't Be Deleted

    The fake app provides the same functionality of the original version of BatteryBot Pro, but performs malicious activity in the background.

  12. ICO Issued Over £1m in Fines in 2014/15

    UK information commissioner launches annual report

  13. Connected Devices Spark Digital Amnesia-And Insecurity

    Most Americans use mobile phones as an extension of their brains—but aren't securing them.

  14. Fed Reserve: Chip and Signature Not Enough

    Chip and signature is a half-measure, falling short of the chip and PIN technology deployed throughout the rest of the world.

  15. Pakistan Implements Biometrics for Remote Teachers

    Pakistan has embraced biometrics as its preferred authentication method to identify “ghost employees” and to combat absenteeism.

  16. IT Pros Believe Cyberattacks Are Under-reported

    87% of respondents think that large financial hacks are happening more often than reported, and right under the nose of security auditors.

  17. Spikes Debuts Isolation Tech for Browser-borne Malware

    The Isla family of web malware isolation appliances processes all web content on secure appliances deployed outside the network.

  18. Click-Fraud Campaigns Could Lead to CryptoWall

    Damballa researchers warn of hidden threats 'in sheep’s clothing’

  19. Security Alert as Flash Flaw Found in Popular Exploit Kit

    CVE-2015-3113 has been used to drop CryptoWall onto PCs

  20. Stealthy Stegoloader Trojan in US Healthcare Blitz

    Victims are concentrated in North America, claims Trend Micro

What’s hot on Infosecurity Magazine?