Infosecurity News
Point-of-Sale Malware Has Become Highly Sophisticated
Point-of-sale (PoS) systems that process debit and credit cards for retail stores and restaurants are in the dubious limelight these days thanks to high-profile hacks at Target and elsewhere. But PoS malware has been lurking around for a very long time, evolving and getting smarter.
Interview: Trey Ford, Global Security Strategist, Rapid7
If you know of Trey Ford, it will probably be as former General Manager at Black Hat. But as of January 2014, he became global security strategist at Rapid7. At Infosecurity Europe, Infosecurity editor Eleanor Dallaway sat down with him to talk about the current threat landscape and the pros and cons of the information security industry.
Cybercrime Boss Offers Ferrari Prize for Most Lucrative Online Attack
New video highlights the problem legitimate organizations have in recruiting the best talent
Heartbleed Bug Hits Industrial Control Systems
The Heartbleed saga continues, this time with an industrial control element. ICS vendor Digi International has identified five products that are vulnerable to the bug, where attackers could obtain user credentials and cryptographic keys used to access the devices.
Bitly Compromised; Users Warned to Reset Accounts
Cyber-danger can be found in many places, including, apparently, basic social networking utilities. Link-shortening service Bitly has warned its users that their account credentials may have been compromised; specifically, users’ email addresses, encrypted passwords, API keys and OAuth tokens.
Mobile Ransomware Gives Android Porn Fans the Willies
Reveton-like malware tricks users into downloading from insalubrious sites. Experts say it could presage a more sophisticated campaign targeted at mobile users.
Spammers Target Mobile Messaging Users in New Malware Blitz
Kaspersky Lab reports increase in spam aimed at Whatsapp, Viber and Google Hangouts users
Saudi Aramco Cyber Attacks a ‘wake-up call’, Says Former NSA Boss
Gen. Keith Alexander warns of threat to CNI systems, but experts question whether 2012 incident was a game changer.
World’s Most Advanced Hackers are in Russia and Eastern Europe
At Infosecurity Europe 2014, Eleanor Dallaway caught up with Ross Brewer, vice president and managing director for international markets, and Mike Reagan, CMO at LogRhythm to talk insider threats, and the global threat landscape…
Japan and EU Shake Hands on Cyber Security Agreement
Leaders met in Brussels this week, agreeing to a formal cyber dialogue and to share knowledge going forward
Cloudy with a Chance of Data Leakage: Dropbox Cops to Shared Links Flaw
Using file sync and share applications can put sensitive personal information, and potentially sensitive corporate information, at risk should a vulnerability be found. Unfortunately, Dropbox has just admitted such a flaw.
ISF: Companies Should Promote Secure Behavior, Rather than Awareness Alone
Organizations have spent millions over recent decades on information security awareness activities, but a recent report asserts that such an approach has flaws.
MI5: Spies and Thieves are Targeting & Grooming Insiders
MI5 has warned British corporate chiefs that foreign intelligence agencies are targeting IT workers within big organisations in a bid to gain privileged access to sensitive data.
Big AOL Data Breach to Blame for Spam Spike
AOL has been hacked, resulting in the compromise of “information regarding a significant number of user accounts.” The data breach is to blame for a large spam/spoofing spike targeting its users.
Infosecurity Europe 2014 > Case Study: Defending Data in the Public Eye
David Jones, head of information security at the BBC, explains how the Corporation protected its data from adversaries including the Syrian Electronic Army.
Infosecurity Europe 2014 > Worst Security Threats go Undetected, Warns Dr Eric Cole
Infosecurity Hall of Fame inductee Dr Eric Cole, chief scientist at Secure Anchor, says the greatest risk to businesses is the threats they cannot see.
Infosecurity Europe 2014 > ICO's David Smith Predicts New Data Protection Laws by 2017
David Smith, deputy commissioner, Information Commissioner's Office, gives an update on the EU Data Protection Regulation and how it will affect UK business.
Android Worm Dangles Pictures to Lure Users to Click
A new worm that would seem more at home in the Windows PC environment than on a mobile phone has made an appearance on the Android platform, bringing classic worm behavior with it.
Infosecurity Europe 2014 > Big Data is No Universal Solution for Security Intelligence
Improved monitoring and analytics can improve the information available to IT security teams. But shifting patterns of work mean it only offers partial insights.
Infosecurity Europe 2014 > Whistleblowing Keeps Security Under Scrutiny Says Hypponen
Whistleblowers have exposed issues around data custody and data privacy, says Mikko Hypponen.