Infosecurity News

  1. Facebook troll is a policeman

    Following Nicola Brookes’ landmark court case that forced Facebook to hand over the IP address details of people abusing her on the social network, a 32-year-old serving policeman has been arrested.

  2. Android malware targets women with 'meet a rich man' gambit

    Hackers are getting more and more personalized, going after specific niches in a long-tail attempt to avoid wide-net security measures. True to form, a new type of Android malware has been spotted, specifically designed to target female, single smartphone users.

  3. Google's Postini transition sparks competitor feeding frenzy

    E-mail security vendors are trying to lure customers away from Google as the internet juggernaut transitions its Postini security customers to its Google Apps infrastructure. The feeding frenzy is unsurprising: Google has 26 million customers for the taking.

  4. Kaspersky looks at the wreckage of Wiper malware

    Kaspersky Lab – which to a large extent has led the analyses of the new cyberweapon class of malware (Stuxnet, Duqu, and Flame) has been taking a closer look at what the most destructive sample, Wiper, has left behind.

  5. VirusBuster is dead. Long live Agnitum’s VirusBuster

    On 7 August 2012, the Hungarian anti-virus company VirusBuster announced the cessation of its similarly-named VirusBuster anti-virus product: the development department is “no longer sustainable in its current form and therefore is in the process of closing down.”

  6. Megaupload v2 in the pipeline

    Kim Dotcom never accepted that Meagupload was finished. Now he has said that it will return, bigger, better and more secure than ever. “We are building a massive global network. All non-US hosters will be able to connect servers & bandwidth. Get ready.”

  7. Second LulzSec member arrested over Sony hacks

    Raynaldo Rivera (aged 20), aka neuron, royal and wildicv, has been taken into custody following his indictment last week charging him with conspiracy and unauthorized impairment of a protected computer; that is, last year’s Sony hacks.

  8. Brain hacking for neurocomputing inches closer to reality

    Imagine a world where sensitive information can be extracted from a brain-computer interface via electronics that quite literally pick your brain for passwords. It may sound like science fiction, but a new experiment into the space has revealed a potentially huge security threat stemming from so-called “brain hacking.”

  9. DR Web discovers the first Linux/OSX cross-platform trojan

    Dr Web, the Russian anti-malware company that did much to expose the growth of the Flashback botnet, has found the first Linux/OSX cross-platform trojan – which it calls BackDoor.Wirenet.1

  10. There’s a new zero-day Java exploit in the wild

    A new Java exploit has been discovered. While not yet widespread, it is in the wild, works with all major browsers, is potentially cross-platform – and has no available patch.

  11. ENISA sees problems with European cybersecurity legislation

    The European Network and Information Security Agency (ENISA) has published a report on ‘Cyber Incident Reporting in the EU’ and has found implementation gaps: “incidents remain undetected or not reported.”

  12. Hacker collective leaks one million records, vows 'hellfire'

    Hacker collective Team GhostShell is boasting that it has breached more than one million user records from 100 corporate and public affairs websites across a variety of industry segments, and leaked them online.

  13. Dropbox adds two-step authentication

    File-sharing has long had a reputation for being a veritable petri dish for viruses and/or credential or identity theft, but web-storage and sharing provider Dropbox is now offering two-factor authentication to thwart would-be hackers.

  14. Swiss Army knife USBs slash security features

    Victorinox, maker of the Swiss Army knife, has abruptly discontinued its security offering for the Swiss Army-branded line of portable USB memory sticks.

  15. Is use of the Find My iPad app actually trespassing?

    In what many would consider a bizarre case in Australia, an accused man says the evidence against him was obtained illegally when an iPad owner electronically tracked a stolen iPad via GPS to his property.

  16. California’s Location Privacy Bill passes Assembly

    Senator Mark Leno’s SB 1434, the Location Privacy Bill, has been passed by the California Assembly with a bipartisan vote of 63-11. Having now passed both chambers of the state legislature, the bill is headed towards Governor Jerry Brown.

  17. Google’s new cloud Wallet – is it secure?

    Earlier this month Google made some fundamental changes to the way in which Google Wallet operates. The main difference is that the ‘active’ part of payment has been shifted from the handheld device to Google’s servers; that is, the cloud.

  18. 90% leading paid mobile apps have been hacked

    Arxan’s new study shows that more than 90% of top paid mobile apps have been hacked. App developers need to take note of this, and defend their own market.

  19. DDoS and the collateral damage of hacktivism

    Hacktivism cuts both ways. The biter gets bit, and a war evolves. Where there is war, there are weapons. And where there are weapons, there is collateral damage. There is a hacktivist war around Julian Assange, between his detractors and his defenders – and there is collateral damage.

  20. ESET analysis links the Quervar virus to the Induc virus

    A detailed analysis of the Quervar.C virus, currently running amok in The Netherlands, shows similarities beyond the likelihood of coincidence with the pre-existing Induc.C virus.

What’s hot on Infosecurity Magazine?