Infosecurity News
Operation PRISM: NSA and FBI monitoring activity at Facebook, Apple, Google, and other tech firms
It’s a potential publicity bomb that has yet to explode, apparently, but the Washington Post and the Guardian are reporting that both the US and the UK governments have been engaged in ongoing data collection of private information from web services, with the support of top tech companies, in an foreign intelligence effort code-named Operation PRISM.
Adware: the most pervasive mobile threat
A new examination of mobile threat data from the Lookout Platform in five countries has found that threats to consumers run the gamut, from annoying to extremely invasive. The study has uncovered that adware and malware threats like spyware, surveillanceware and trojans are in particular proliferating.
Connected TVs open up a host of threat vectors
In today’s world, everything from refrigerators to cars are beginning to get “connected” and given the ability to talk to you and to other things via broadband networks. Much of this still seems like science fiction, but when it comes to connected TVs, the concept has already jumped the chasm to the mainstream. And, like anything connected to the internet, smart TVs are turning out to be another threat vector for hackers.
‘Beyond Orwellian’ – the FBI and NSA spy on all Americans
The Guardian newspaper has exposed a Foreign Intelligence Surveillance Court (FISC) ‘top secret’ order requiring Verizon to provide the NSA with all ‘telephony metadata’ for communications within the USA and between the USA and abroad.
Secunia names new CEO
Secunia, the Copenhagen-based provider of security software, announced the appointment of Microsoft’s Peter Colsted as the firm’s new chief executive.
Human error and system glitches drive nearly two-thirds of data breaches
The Ponemon Institute today released the 2013 Cost of Data Breach Study: Global Analysis which reveals data breaches are often the result of poor processes, and the latest study from Ponemon Institute bears this out: Human errors and system problems caused two-thirds of data breaches in 2012. They also pushed the global average cost to $136 per compromised record.
The effect of BYOD on information security
A new survey outlines the practical experience of IT/security professionals over the increasing use of personal devices within their business environment during the last 12 months.
Adobe CSO: Fixing vulnerbilities won't thwart hackers
For commercial software coders looking to thwart cybercriminals, finding and fixing vulnerabilities is all well and good. In reality, though, that approach to product security can be a colossal waste of time and resources, according to Adobe's Brad Arkin. What really makes a difference is mitigation.
Americans concerned about data breaches, but split on government disclosure regulation
As the government continues to mull regulations on cybersecurity info-sharing, a survey shows that a majority of Americans (82.1%) are concerned about a data breach involving at least one of five organization types. However, they’re evenly mixed on whether legislation should require private businesses to share cyber-attack information with the government.
NetTraveler spyware compromised 1,000 political and industrial targets
The malware behind a widespread cyber-espionage campaign against political and critical industry targets has been called out: NetTraveler, a malicious program used for covert computer surveillance, has successfully compromised at least 350 high-profile victims in 40 countries, with the total likely closer to 1,000.
New smartphone chip solves the mobile digital rights management problem
ARM, the British chip manufacturer that dominates the world's smartphones, is making it more attractive for high-value video content producers (Hollywood studios) to make HD films available on smartphones.
Be careful where you get your Apple iOS7 news – it may be a phish
Security researchers have discovered a new phishing website ‘under construction’; one designed to take advantage of rapidly growing iOS7-mania.
Malicious charger can compromise iPhone and iPad in under one minute
Security for Apple mobile devices has been looking pretty good in light of the tsunami of Android malware making headlines lately, but a newly discovered hardware vulnerability in the Apple iPhone, iPad and iPod Touch adds new concern when it comes to the iOS platform.
Evernote beefs up security with two-factor verification
Evernote has become the latest online denizen to roll-out two-step verification for accounts, following a hack that required all 50 million users to reset their passwords. It’s also implemented access history and authorized applications features.
Cybercriminals consider their financial options, post-Liberty Reserve
In the wake of a favorite money-laundering service being seized and taken down by the US government, the hacking underworld is mulling what to do next, financially.
Google Won’t Approve Facial Recognition for Glass
No facial recognition for Google Glass yet – at least not through the front door - "without having strong privacy protections in place" confirmed Google in a brief Google+ statement Friday.”
Google must comply with NSLs, says judge
A company, assumed to be Google, had challenged the legality of 19 National Security Letters demanding account information on its users; but a judge last week ruled that it must comply.
LinkedIn adds two-factor authentication
In the wake of high-profile Twitter and Facebook hackings and about a year after it experienced a password heist, LinkedIn is beefing up its security: it has become the latest web denizen to join the optional two-factor verification fray, and is now offering free trials of security software to users.
Microsoft unveils cloud-based, real-time botnet info-sharing initiative
Microsoft has kicked off the Cyber Threat Intelligence Program (C-TIP), an outgrowth of its information-sharing initiative around botnets.
Drupal hit by massive data breach
Drupal, the open source content management system, is resetting the passwords for nearly one million accounts in the wake of a data breach.