Infosecurity News

  1. Orgs Leave Thousands of Sensitive Files Open to Employees

    47% of organizations were found to have at least 1,000 sensitive files accessible to every employee.

  2. Chipotle Reports Suspicious Activity on POS System

    Chipotle has detected “unauthorized activity” on a network that supports its payment processing for purchases made at its restaurants

  3. DNC Hacking Group Aims Sights at Macron

    French presidential hopeful and German political groups targeted by Pawn Storm

  4. Unroll.me Apologizes for Not Being Clear It Sells User Data

    Unsubscribe service promises to be more transparent

  5. Employees Are Sharing Confidential Info at Alarming Rates

    Nearly three in four employees (72%) are willing to share sensitive, confidential or regulated company information.

  6. Interpol Spots Thousands of C&C Servers Across Asean

    Public-private operation also discovers hundreds of compromised sites

  7. LinkedIn Apologizes After Privacy Snafu

    “Find nearby” feature accidentally included in latest update

  8. POS Hacker Seleznev Gets 27 Years

    No mercy from the courts for Russian MP’s son

  9. Giant Viagra Botnet Claims 80K Devices

    Researchers were able intercept payloads with details of 51 websites used by spammers to sell counterfeit drugs.

  10. Two-Thirds of Apps Using Open Source Have Known Software Vulns

    85% contain license conflicts

  11. Mastercard's Biometric Card Promises "Apple Pay" Without the Phone

    Fingerprint reader is embedded in payment card for low friction check-out

  12. #IAPP Conference: Panel - Whose Eye is on the Five Eyes? An Intro to International Oversight Bodies

    A panel of privacy commission representatives discussed the role of their organizations amid heightened public concern over state surveillance activities

  13. Researchers Find Multiple RCE Bugs in Linksys Routers

    IOActive works with manufacturer on issues with Smart Wi-Fi models

  14. Android SMS Spyware Sees Millions of Downloads

    SMSVova can steal and relay a victim's location to an attacker in real time.

  15. Mirai-Busting Hajime Worm Could be Work of White Hat

    P2P-controlled malware blocks IoT device access to suspect ports

  16. Hundreds of Google Play Apps Infected with the BankBot Trojan

    It infiltrates benign programs, hitching a ride to installation on users’ phones. Then it steals banking credentials and card details.

  17. Bad Guys Still Rely on Marks to Click on Something

    On Monday holidays, alerts dip significantly, due to a lack of employees interacting with malicious emails, attachments and links.

  18. #CRESTCon & IISP Congress: Passive Data Sources Can Make System Mapping Great Again

    There is a lot to learn from listening to our systems

  19. Call for DHS to Abandon Demands for Travelers' Social Log-Ins

    Rights groups claim plans will undermine cybersecurity for those entering US

  20. Karmen Ransomware: User-friendly, Sandbox-averse

    A dashboard shows relevant information, including the number of clients and how much money earned.

What’s Hot on Infosecurity Magazine?