Infosecurity News
Bug found in Playstation 3
If you haven't already upgraded your Playstation 3 firmware from 4.31 to the 4.41 version released at the end of last month, now might be a good time to do so - it fixes a bug found by Vulnerability Lab six months ago.
The Virtual Global Task Force report on online child pornography
Online child pornography, rather than child sexual abuse, may be a useful distinction to help prevent online offenders developing into physical abusers – thought to be a potential rather than inevitable progression.
Chinese hackers make off with US weapons blueprints, Australian spy HQ plans
Chinese hackers have scored two high-profile cyber-heists, according to reports: they have gained access to designs of more than two dozen major US weapons systems, while also stealing the blueprints for Australia's new spy headquarters.
Facebook Fan Page phishing scam aims to hijack accounts
A fresh phishing scam looking to capitalize on the popularity of Facebook Fan Pages has thrown a lure in using a security warning.
Is the Xbox One a Covert Surveillance Device?
When details about Microsoft’s new games console, the Xbox One, first began to emerge, privacy campaigners were immediately concerned: is the Xbox One an intrusive but covert surveillance device?
Sky Apps hacked – but not the apps themselves
Sky’s Android users may have woken on Sunday morning to headlines screaming ‘Sky UK Apps Compromised on Play Store, Uninstall Them!’ But don’t be too hasty.
Man made redundant fined for stealing sensitive information
When he learned that he was being made redundant from his position as Community Health Promotions Manager at a council-run leisure center, he emailed sensitive medical information on 2471 people to himself to help establish his own new company.
Experian tackles social media risk
Global financial information company and credit score keeper Experian has implemented new security controls to drive cyber-risk out of its social media activities, in an effort to safeguard consumer information.
Microsoft Stops Predicting AV Samples to Focus on Ecosystem
The Microsoft Malware Protection center is shifting its research focus away from predicting test samples and instead focussing on prevalence-weighted response and family research.
DDoS and the challenge of civil disobedience on the internet
Starting with the Anonymous Operation Payback in 2010, in retaliation for what many consider the illegal financial blockade of WikiLeaks, DDoS as a weapon of dissent has increasingly become a part of life on the internet.
Education Institutions at Forefront of BYOD
BYOD as a security issue has largely focused on the business arena – the dangers inherent in allowing personal smartphones and tablets to connect to the corporate network. But mobile devices have been adopted as a way of life with youngsters, and in some ways education has led the BYOD phenomenon.
Blue Coat Systems to acquire Solera Networks
Blue Coat operates largely outside of the perimeter; Solera Networks operates within the perimeter. Put the two together and you have the complete security solution – that is the the theory behind Blue Coat’s latest acquisition.
Most small businesses don't understand mobile security threats
New research into eight critical security threats on mobile devices found the majority of small to medium enterprises (SMEs) are either unaware of or defenseless against the threats posed to their networks by mobile devices and BYOD.
The HangOver Campaign - more on Indian hackers targeting Pakistan
A few days ago details of a long-standing and wide-ranging attack primarily against Pakistan and apparently emanating from India were released. Now it appears it was just the tip of an iceberg.
Queen's Speech and user identification through IP addresses
The reason for Her Majesty's government to bring forward proposals viz-a-viz "the problem of matching Internet Protocol addresses" (Queen's Speech 2013) may have as much to do with BT's current plans as with the stalled Communications Data Bill.
Mandiant: Chinese espionage hackers are back
The group of Chinese cyber-espionage hackers reportedly operating as an arm of the People’s Liberation Army is allegedly back at it, attacking a range of US enterprise and government targets to steal everything from technology blueprints to business plans to manufacturing information.
Password strength meters inspire better choices – but only for sensitive accounts
Password strength meters that offer web surfers a visual gauge of how weak or strong a chosen lock may be are increasingly present on websites – but how effective are they at getting folks to choose stronger options? When it comes to locking down sensitive data, meters had an impact, suggesting that they act as important reminders for users about what’s at stake.
Snapchat's woes escalate with complaint to FTC
First it was shown that Snapchat photos and videos on Android are not deleted, merely hidden; then a YouTube video shows how to locate Snapchat videos on iOS; and now a complaint alleging deceptive business practices has been filed with the FTC.
UK customers charged twice with contactless payment cards
Marks and Spencer, Pret a Manger and Transport for London customers have all reported automatic payment deductions from contactless payment cards while they were making payment by other means, renewing long-standing concerns over the security of contactless payment cards.
22 million user IDs may have been stolen from Yahoo Japan
Yahoo Japan, 35.5% owned by Japan’s mobile phone operator SoftBank and 34.7% owned by Yahoo Inc, announced Friday that it may have lost 22 million user IDs from its total of around 200 million.