Infosecurity News

  1. BlackHat 2014: Medical Device Security Not as High Risk as Previously Claimed

    While it's true that medical devices are vulnerable and can be tampered with, these attacks are still in the realm of unlikelyhood.

  2. BlackHat 2014: Square Launches Bug Bounty Program

    The program has paid $250-$1,500 per bug for uncovering card payment issues.

  3. Google Gives HTTPS a Helping Hand by Demoting Insecure Sites

    Web giant will use the secure protocol as a ‘signal’ in search ranking algorithm

  4. FBI Used Drive-By-Downloads to Expose Tor Pedophiles

    Controversial Operation Torpedo has come to light through released court documents.

  5. BlackHat 2014: Airport Scanners Riddled with Security Flaws

    The scanners used by many airports in the United States are riddled with security flaws, a security researcher told attendees at the Black Hat conference in Las Vegas Wednesday.

  6. WordPress Vulnerability Affects A Quarter of the Internet

    The wide-net bug paves the way for massive DDoS attacks that can’t be mitigated by normal security measures.

  7. John McAfee: Google and Facebook’s Erosion of Privacy is a Tragedy

    AV founder calls on users to take a stand against apps which are chipping away at personal freedoms.

  8. NSS Launches Cyber Resiliency Center

    The SaaS tool runs “what if?” scenarios that model a given environment’s deployed security layers, to show which threats are able to exploit their attack surface.

  9. Black Hat 2014 Keynote: What InfoSec Needs to Do

    Security visionary Dan Geer laid out recommendations and observations for the information security industry in his keynote speech for the Black Hat security conference on Wednesday.

  10. Google’s Gmail Scanning Leads to Arrest of Convicted Child Sex Offender

    Web giant claims it doesn’t scan for any other signs of illegal activity.

  11. Fake MH17 Video Page Leads to Bloatware

    The scam leads users to a minefield of potentially unwanted programs.

  12. Poweliks Malware Hides in Registry to Evade AV Tools

    Traditional security will not find this new threat, experts warn.

  13. IcoScript RAT Hides Behind Yahoo! Email Addresses

    The malware went undetected for years thanks to clever camouflage.

  14. BlackHat USA 2014: Multi-factor Authentication Tackles BYOD Complexity

    Authentify offers prioritization for biometrics and other authentication mechanisms.

  15. Israeli Spies Tapped John Kerry’s Phone Calls – Report

    Intelligence services eavesdropped on secretary of state during key peace talks, according to a German report.

  16. GCHQ Announces First Master’s Degree Courses in Infosecurity

    First milestone for government plan to improve higher education options and close skills gaps.

  17. Mozilla Fesses up to Accidental Data Breach

    Firefox developer exposed personal details of 76,000 users of its Developer Network

  18. Citadel Evolves to Boost Persistency

    The banking trojan has added use of remote desktop to evade security software.

  19. Fiesta Exploit Kit Starts Delivering a Double Payload

    Malware authors are looking for more bang for the buck.

  20. Backoff PoS Malware is Crafty and Dangerous, US-CERT Warns

    The card-scraping bug have been undetectable by AV systems so far.

What’s hot on Infosecurity Magazine?