Infosecurity News

  1. China suspected in Facebook attack using bogus NATO commander account

    China is suspected of being behind social engineering attacks using a bogus Facebook account of the NATO commander to steal secrets from colleagues, friends, and family.

  2. The return of Kelihos

    Recent reports on the return of the Kelihos demonstrate the difficulty in keeping a good bot down.

  3. Telecom execs warn Congress about excessive regulation in cyber bills

    US telecom executives came out strongly against government regulation of cybersecurity in the private sector during a House hearing this week.

  4. Vupen strikes again: French team cracks IE 9 in Pwn2Own hack contest

    A team from the French security firm Vupen has cracked a second browser during the Pwn2Own hacking contest at CanSecWest – Internet Explorer 9 – after compromising Chrome on the first day of the competition.

  5. SFIA Foundation maps ISACA certifications to IT skills framework

    The Skills Framework for the Information Age (SFIA) Foundation has recognized two ISACA information security certifications as part of its IT skills framework.

  6. McGill shuts down website that published confidential donor data

    Canada’s McGill University has shut down a website that published confidential data on school donors, including names, addresses, phone numbers, and the amount they donated.

  7. Rogue anti-virus up and Kelihos botnet is back

    GFI Software’s report for February highlights two main issues: the incidence of rogue anti-virus is continuing to increase; and the Kelihos botnet ‘taken down’ last year is resurgent.

  8. Today's #FFF hack by Anonymous is a police equipment store

    Anonymous has vowed to do a hack every Friday, calling it the #FFF campaign. Today AntiSec defaced the New York Ironworks, a police equipment supplier that describes itself as ‘NYC's finest police equipment & tactical op’s gear store.’

  9. Kaspersky perplexed by Duqu code

    Kaspersky Lab researcher Igor Soumenkov is asking for help in identifying a mystery code in the Duqu virus, the follow-on to Stuxnet uncovered last year.

  10. Heat wave: US administration tries to 'simulate' support for Senate cybersecurity bill

    The Obama administration on Wednesday simulated a cyber attack on the New York City power grid during a summer heat wave in an effort to convince US senators to pass comprehensive cybersecurity legislation.

  11. CPA may help local authorities reduce data loss

    Becrypt’s DISK Protect full-disk encryption product is the first commercial product to be granted CPA certification. By encrypting local authority laptops, it may help prevent the continuous leakage of personal data.

  12. Trustwave to acquire M86 Security

    Trustwave, a Chicago-based security company with offices around the world, has signed a definitive agreement to acquire M86 Security, which is based in Irvine California and has international headquarters in London and R&D in California, Israel and New Zealand.

  13. Only one-third of firms can quantify the financial impact of a data breach

    Only 34% of companies are strongly confident about quantifying the potential financial impact of a data breach, according to a report by security firm McAfee.

  14. Successful bank phishing attacks target compromised infrastructure

    Nearly all of the successful phishing attacks against US banks exploit compromised infrastructure, according to data compiled by email security firm Agari.

  15. Trust in communications is decreasing

    While the UK is becoming increasingly better connected, trust in those connections is declining.

  16. THOR: a new P2P botnet for sale

    A new botnet is nearing completion and is being offered for sale on the hacking underground at $8000.

  17. India/Bangladesh cyberwar moves to a new level

    The ongoing cyberwar between India and Bangladesh has escalated with Teamgreyhat, in support of “our Indian brothers”, moving from commercial to economic targets.

  18. Cyber churn at DHS: And Schaffer makes six

    Greg Schaffer is leaving his post as head of the US Department of Homeland Security’s Office of Cybersecurity and Communications, marking the sixth high-ranking cyber official to leave the agency since June 2011.

  19. Twitter complies with court order – hands over account details

    Guido Fawkes in the UK is the pseudonym of an award-winning anti-establishment blog operated by Paul Staines. In the US it is a name associated with a Twitter account handed over to law enforcement. Around the world is has become associated with the Anonymous movement.

  20. Cable modem hacker convicted of defrauding cable firms out of $1 million

    Ryan Harris, known as the cable modem hacker, was convicted on seven counts of wire fraud by a federal court in Boston for helping users steal internet access that cost cable companies $1 million in lost revenues.

What’s hot on Infosecurity Magazine?