Infosecurity News
Decommissioned PCs live on
Research just completed by Computer Aid claims to show that 33% of major firms have decommissioned computers containing data which are completely unaccounted for.
Rochdale council loses 18,000 resident's details on unencrypted USB stick
Rochdale Council has been found guilty of breaching the Data Protection Act after it lost an unencrypted USB stick containing the details of more than 18,000 residents.
Critical infrastructure companies are less engaged in government programs
Companies are less aware and engaged in government critical infrastructure protection (CIP) programs this year compared with 2010, according to a Symantec survey.
Chronopay co-founder Pavel Vrublevsky refused bail in Russia
Reports are coming in that Pavel Vrublevsky, the co-founder of Chronopay, the Russian e-money service used a large number of web sites in the former Eastern bloc, has been refused bail.
Hackers down landline and cellular systems in Gaza and West Bank
Unknown hackers are reported to have downed the landline and cellular networks n Gaza and the West Bank, the Palestinian telecoms minister has announced.
ISACA research shows bring-you-own-device to workplace trends rising rapidly
Research from ISACA claims to show that the number of organization's allowing staff to bring their own devices to the workplace is increasing.
More than a third of US companies are not prepared to fend off APTs
More than one-third of US companies are poorly prepared for advanced persistent threats (APT), according to a report by the Enterprise Strategy Group (ESG).
Android Dolphin HD browser hit by major security problems
Dolphin HD, an advanced web browser for the Android platform, is reported to be relaying details of web sites accessed on the device it is installed on to a remote server.
Secunia joins the bounty-for-bugs bandwagon
Secunia, the independent IT security research agency, has become the latest to start rewarding researchers for information on security vulnerabilities. The firms joins the likes of Barracuda Networks and Google's Chrome operation in this regard.
CNAS report recommends new approach to US national security
The Center for a New American Security (CNAS) has released a report recommending that the US Department of Defense adapt its national security strategy to embrace the new science of predictive failure. At the same time, the report also suggests that the DoD needs to raise its game in terms of intelligent predictions.
Check Point acquires Israel's Dynasec to boost GRC offerings
Check Point has announced it is in the process of acquiring Dynasec, a privately held Israeli compliance solutions firm that was founded back in 2004. Sources suggest the purchase price is in the region of $10 to $20 million, although no figures have been confirmed by either party.
Researcher explains how fraudulent drop-ships allow criminals to monetize card credentials
A leading security researcher has been analyzing how cybercriminals monetize their stolen credit and debit card credentials and discovered that drop-shipping is one of the most common methods of fraudulently misusing card information harvested from various sources.
Malaysia backs global cybersecurity group to share threat data
Malaysia has set up the Global Cyber Security Alliance (GCSA) to encourage sharing of cyber threat information among nations.
Firms lose 12% of their brand value from data breaches, survey finds
Companies that experience a major data breach lose on average 12% of their brand’s value, according to a survey conducted by the Ponemon Institute and sponsored by Experian Data Breach Resolution.
Stop! Don't pick up that apparently lost iPhone!
A Novato, Calif., woman thought she was doing the right thing by picking up an apparently lost iPhone 4 in her shopping cart, taking it to her son's home and calling the phone's owner to tell her she could collect the handset.
The real world consequences of an APT hack
Security researcher Brian Krebs has detailed an interesting analysis of how an APT attack ended up with Chinese hackers effectively running amok on a hedge fund's IT resource – and how the company dealt with the problem.
Hackers disrupted US government satellites, says report
Hackers, perhaps from China, interfered with two US government satellites during 2007 and 2008 by penetrating a ground station in Norway, according to a report being issued by a congressional commission next month.
TDL4 botnet may be available for rent
ESET's senior research fellow David Harley says that, while his team of researchers have been tracking the TDL4 botnet for some time, they have noticed a new phase in its evolution.
Solera research director spots a hybrid spear phishing attack
Andrew Brandt, The newly-installed director of threat research with Solera Networks, has been analyzing what appears to be a hybrid spear phishing attack against a colleague and revealed the effort that goes into making these targeted attack emails look genuine.
Jericho Forum talks about identity security strategies
At the RSA Europe event earlier this month, Infosecurity got a chance to catch up with Paul Simmonds, a board member of the Jericho Forum.