Infosecurity News

  1. Malicious charger can compromise iPhone and iPad in under one minute

    Security for Apple mobile devices has been looking pretty good in light of the tsunami of Android malware making headlines lately, but a newly discovered hardware vulnerability in the Apple iPhone, iPad and iPod Touch adds new concern when it comes to the iOS platform.

  2. Evernote beefs up security with two-factor verification

    Evernote has become the latest online denizen to roll-out two-step verification for accounts, following a hack that required all 50 million users to reset their passwords. It’s also implemented access history and authorized applications features.

  3. Cybercriminals consider their financial options, post-Liberty Reserve

    In the wake of a favorite money-laundering service being seized and taken down by the US government, the hacking underworld is mulling what to do next, financially.

  4. Google Won’t Approve Facial Recognition for Glass

    No facial recognition for Google Glass yet – at least not through the front door - "without having strong privacy protections in place" confirmed Google in a brief Google+ statement Friday.”

  5. Google must comply with NSLs, says judge

    A company, assumed to be Google, had challenged the legality of 19 National Security Letters demanding account information on its users; but a judge last week ruled that it must comply.

  6. LinkedIn adds two-factor authentication

    In the wake of high-profile Twitter and Facebook hackings and about a year after it experienced a password heist, LinkedIn is beefing up its security: it has become the latest web denizen to join the optional two-factor verification fray, and is now offering free trials of security software to users.

  7. Microsoft unveils cloud-based, real-time botnet info-sharing initiative

    Microsoft has kicked off the Cyber Threat Intelligence Program (C-TIP), an outgrowth of its information-sharing initiative around botnets.

  8. Drupal hit by massive data breach

    Drupal, the open source content management system, is resetting the passwords for nearly one million accounts in the wake of a data breach.

  9. Bug found in Playstation 3

    If you haven't already upgraded your Playstation 3 firmware from 4.31 to the 4.41 version released at the end of last month, now might be a good time to do so - it fixes a bug found by Vulnerability Lab six months ago.

  10. The Virtual Global Task Force report on online child pornography

    Online child pornography, rather than child sexual abuse, may be a useful distinction to help prevent online offenders developing into physical abusers – thought to be a potential rather than inevitable progression.

  11. Chinese hackers make off with US weapons blueprints, Australian spy HQ plans

    Chinese hackers have scored two high-profile cyber-heists, according to reports: they have gained access to designs of more than two dozen major US weapons systems, while also stealing the blueprints for Australia's new spy headquarters.

  12. Facebook Fan Page phishing scam aims to hijack accounts

    A fresh phishing scam looking to capitalize on the popularity of Facebook Fan Pages has thrown a lure in using a security warning.

  13. Is the Xbox One a Covert Surveillance Device?

    When details about Microsoft’s new games console, the Xbox One, first began to emerge, privacy campaigners were immediately concerned: is the Xbox One an intrusive but covert surveillance device?

  14. Sky Apps hacked – but not the apps themselves

    Sky’s Android users may have woken on Sunday morning to headlines screaming ‘Sky UK Apps Compromised on Play Store, Uninstall Them!’ But don’t be too hasty.

  15. Man made redundant fined for stealing sensitive information

    When he learned that he was being made redundant from his position as Community Health Promotions Manager at a council-run leisure center, he emailed sensitive medical information on 2471 people to himself to help establish his own new company.

  16. Experian tackles social media risk

    Global financial information company and credit score keeper Experian has implemented new security controls to drive cyber-risk out of its social media activities, in an effort to safeguard consumer information.

  17. Microsoft Stops Predicting AV Samples to Focus on Ecosystem

    The Microsoft Malware Protection center is shifting its research focus away from predicting test samples and instead focussing on prevalence-weighted response and family research.

  18. DDoS and the challenge of civil disobedience on the internet

    Starting with the Anonymous Operation Payback in 2010, in retaliation for what many consider the illegal financial blockade of WikiLeaks, DDoS as a weapon of dissent has increasingly become a part of life on the internet.

  19. Education Institutions at Forefront of BYOD

    BYOD as a security issue has largely focused on the business arena – the dangers inherent in allowing personal smartphones and tablets to connect to the corporate network. But mobile devices have been adopted as a way of life with youngsters, and in some ways education has led the BYOD phenomenon.

  20. Blue Coat Systems to acquire Solera Networks

    Blue Coat operates largely outside of the perimeter; Solera Networks operates within the perimeter. Put the two together and you have the complete security solution – that is the the theory behind Blue Coat’s latest acquisition.

What’s hot on Infosecurity Magazine?