Infosecurity News

  1. Twitter Government Access Requests Jump 50%

    Washington wants to know more about micro-blogging users than any other government, according to latest Transparency Report.

  2. Russia Demands Apple and SAP Hand Over Source Code

    Kremlin wants tech giants to prove they’re not a conduit for NSA spying.

  3. Internet of Things Laid Bare: 25 Security Flaws Per Device

    HP researchers discover 70% of the most common devices have vulnerabilities.

  4. Crippling DDoS Hits Major Aussie Broadband Provider

    Cirrus Communications had half of its network taken down by attack earlier this week.

  5. Chinese Hackers Use APTs to Target Gaming Companies

    TG-3279 group wants to play games for free or re-use source code in competing products, says Dell

  6. Cloud Security Alliance Develops Assessment Spec for Third Parties

    The STAR Attestation is aimed at CPA assessments.

  7. DDoS-ers Launch Attacks From Amazon EC2

    Cybercriminals exploit vulnerability in Elasticsearch software to infiltrate cloud instances.

  8. Nation-E Readies Cybersecurity Center for Critical Infrastructure

    The focus will be on training and disaster preparedness.

  9. Bugcrowd Launches Open-source Disclosure Framework

    The move is meant to encourage responsible vulnerability disclosure practices.

  10. UK Drops Charges Against US Hacking Suspect Love

    British man released from bail but another US indictment is filed as extradition pressure mounts.

  11. C-Level Execs Concerned About Cybersecurity, But Not Investing in It

    Time, interest and funding are all lacking despite the reputation hazards of a data breach.

  12. Critroni/Onion Is Most Sophisticated Ransomware Yet

    The malware uses the Tor anonymity network to attack its victims.

  13. One in Three Ex-employees Can Access Corporate Networks

    Research shows that insider threats continue long after job termination.

  14. UK Netizens Unmoved by ISP-level Porn Filters

    Ofcom report shows only small percentage of users switched on parental controls.

  15. StubHub Breach Part of a Coordinated, International Cybercriminal Ring

    Law enforcement agencies in several countries have carried out a joint disruption of the alleged perpetrators.

  16. Internet Explorer Vulnerabilities Double in 2014

    Criminals, as ever, adapt to go after low-hanging fruit.

  17. ISACA Revamps COBIT 5 Core Principles

    Five new core tenants will underpin the framework.

  18. Nigeria’s 419 Scammers Trade Up to Info-Stealing Trojan Attacks

    Palo Alto Networks warns of new risk to businesses from relative malware 'novices'.

  19. Snowden to Hackers of the World: Build NSA-proof Systems

    Technologists also have a ‘civic duty’ to teach those around them how to use tech safely, whistleblower Edward Snowden says.

  20. Nasdaq Hackers Used Two Zero Days But Motives a Mystery

    US intelligence pointed finger at Moscow but questions remain three years on.

What’s hot on Infosecurity Magazine?