Infosecurity News

  1. Lakeland Kitchenware Hacked with Java 0-Day

    The Lakeland kitchenware online store has emailed its customers with a warning that two of its databases were breached by hackers late last week, and that it was resetting all customer passwords.

  2. iOS and Android VoIP Service Viber Hacked by Syrian Electronic Army

    The pro-Assad hacking group Syrian Electronic Army (SEA) yesterday defaced the Viber subdomain support.viber.com and pasted a screenshot of user information supposedly taken from a breached database.

  3. Global Cybercrime, Espionage Costs $100–$500 Billion Per Year

    Cyber-crime and espionage is clearly a costly scourge for businesses and governments, factoring in data theft, clean-up costs, brand damage, customer losses, and so on. In total, the range for cybercrime loss to the global economy is between $100 billion and $500 billion, according to McAfee.

  4. UAE Fends Off Cyber-Attacks Originating in Egypt

    The United Arab Emirates has successfully fought off a series of cyber-attacks that it was able to trace back to Egypt.

  5. Report: China Uses Taiwan as Test-Bed for US Cyber-Espionage Attacks

    Disputed ex-Chinese province Taiwan is reportedly playing a big role in the global cyberwar. Security experts say the island is a proving ground for Chinese hacker-spies, who attack its IT infrastructure on a regular basis with hundreds of attempts per month, before deploying those tactics to other countries like the US.

  6. Web Applications Attacked 26 Times Per Minute

    A new web application attack report reveals that retailers suffer twice as many SQL injection attacks as other industries, and that one website received 94,000 attack requests in 24 hours – or 26 attack requests per minute.

  7. Cameron on Internet Porn: Global Alliance to "Stamp Out Vile Images"

    Prime Minister David Cameron's expected statement on internet porn was duly delivered yesterday, and led to immediate accusations of being confused, unworkable, and the beginning of online censorship.

  8. Royal Baby: Exclusive Pics! – Don't Fall for It

    When Kate Middleton, the Duchess of Cambridge, went into labor with the child who recently became third in line for the throne of England, the event immediately had millions of royal-watchers riveted – and, apparently, plenty of spammers ready to leverage the vast amount of public interest in everything from the sex of the baby to “secret pictures” of the new arrival.

  9. SIM Cards Cracked; Hundreds of Millions of Phones Vulnerable

    The SIM card – long considered the uncrackable heart of the mobile phone – can finally be rooted. Details will be presented by a German researcher at Black Hat on 31 July. Meanwhile estimates put the number of vulnerable phones at either 500 million or 750 million.

  10. Ubuntu Forum Hacked; 1.8 Million Accounts Compromised

    On Saturday, Canonical – which looks after the Ubuntu Linux user forum – received reports of a site defacement. Within four minutes it had taken the Ubuntu Forums site off-line to investigate what turns out to be a major hack.

  11. Apple Developer Site Breached

    Two things happened last week: Apple developers began to receive unexpected password reset emails, and the Apple Developer center was shut down for maintenance. Everything pointed to a breach; but Apple said little.

  12. California Student Gets Jail Time for Rigging Campus Election with Keyloggers

    It’s a rite of passage for many college students to run for student government office – particularly if they have grander political aspirations. But some take it just a tad too seriously (think Tracy Flick in “Election”). Take, for instance, the case of a former Cal State San Marcos student who has been sentenced in federal court to a year in prison for using keylogging software to rig a campus election.

  13. Java: Write Once, Pwn Anywhere

    Just as a new report explains why Java vulnerabilities, despite Oracle's best efforts, remain the hackers' favored target, a Polish researcher discovers that the latest version, Java 7, is susceptible to a 10-year old attack.

  14. Rex Mundi Hackers Post Data Stolen from Numericable

    Numericable is a cable TV company operating in France, Belgium and Luxembourg. Rex Mundi claimed to have stolen customer data and demanded €22,000 for its return. Numericable declined, and denied that the hackers had the data.

  15. Tumblr Patches its iOS App After Password Vulnerability

    A brief statement from Tumblr late on Tuesday confirmed that its iPhone and iPad apps had been updated to patch "an issue that allowed passwords to be compromised [sniffed] in certain circumstances."

  16. GCHQ's Use of NSA's Prism Data is Legal, says UK

    The legality of Prism in the US is a question for Congress and the US courts, says Sir Malcolm Rifkind, chairman of the UK's all-party Intelligence and Security Committee – but the acquisition of Prism data by GCHQ is done legally.

  17. Dirty AndroRAT: New Tool Lets Anyone Trojanize Android Apps

    Malware authors are ever-adaptable, as evidenced by the rise of remote access tools (RAT) written in Java that are capable of running on multiple operating systems. The Android mobile operating system has made its way into the RAT crosshairs, with a new “binder” for sale in the criminal underground that allows users to repackage and trojanize legitimate Android applications.

  18. Mobiquant Invited by Japanese Government to Exhibit at IT pro EXPO

    The France-based mobile security specialist will participate in Japan’s leading IT innovation trade event to demonstrate its security solutions.

  19. Water Hole Replacing Spear-Phishing as State-Sponsored Weapon of Choice

    Spear-phishing is an attack that attempts to ensnare a specific individual or group of victims via email; water hole attacks wait for the victim to come to the trap. Attackers – especially state-sponsored attackers – are increasingly turning to the latter as their weapon of choice.

  20. Verizon Hack Turns Femtocells into Mobile Spy Stations

    Femtocells are nice-to-have mini-cells that boost cellular coverage indoors, to prevent consumers from going down to one, slow bar inside a house or store. Verizon Wireless offers femtocells for home use, but it turns out they can do more than supercharge one’s 3G – the $250 gadgets can also be turned into mobile spy stations.

What’s hot on Infosecurity Magazine?