Infosecurity News

  1. Been taken in by a Nigerian 419 scam? Get your compensation here...

    Most savvy internet users will be familiar with the so-called 419 'forward fee' scams from Nigeria - requesting a modest fee upfront in return for healthy funds transfers in the medium term that never materialise. But now a new twist on the scam has surfaced: 419 forward fee compensation.

  2. Surrey Police delivers open data app for iPhone users

    Surrey Police has introduced a free iPhone app, built using the Appcelerator Titanium development tool, which delivers local crime and policing information using open government data.

  3. Security researcher reveals that pharma spam may no longer be profitable for scammers

    Here's a spot of good news: a leading security researcher has asserted that his research suggests that so-called pharma spam – which promotes pharmacy offerings via unwanted emails – may no longer be as profitable as it once was, and may even be a loss generator.

  4. Top tips to protect against AET security threats published

    Stonesoft, the IT security vendor that caused a stir last October when it revealed the presence of a new type of security threat using AETs – Advanced Evasion Techniques – has published a set of recommendations for those organisations looking to better defend their IT resources against the problem.

  5. Alleged hacker successfully penetrated Facebook's servers

    In what observers are calling the first case of its kind – in the UK at least – a York-based senior student is being prosecuted for what officials are claiming was repeated attempts to illegally access Facebook.

  6. How cybercriminalscash in on latest Android malware

    A Trend Micro senior threat researcher has detailed how cybercriminals can now make money from Android malware and the security fallout the latest smartphone infections such as Nickispy can cause.

  7. Online shopping confidence drops precipitously, survey finds

    Consumer confidence in the security of online shopping has dropped 11% over the last two years, according to a survey conducted by Harris Interactive on behalf of security firm McAfee.

  8. Data breaches cost Indian banks an average of $2.8 million last year

    Indian banks lost on average Rs126 million ($2.8 million) last year as a result of data breaches, according to a report by Symantec.

  9. Looted smartphones appearing on auction sites, but how can you avoid buying stolen goods?

    Anecdotal evidence suggests that the typical price of mid-to-high-end smartphones has taken a tumble on internet auction sites such as eBay over the last week or so, suggesting that looters from the London riots are disposing of their stolen goods online.

  10. New malware generates reverse text in file names

    A security researcher has warned of a new type of malware that reverses and hides the 'exe' in the name of a file, making an exe file appear, for example, as a text or doc (document) file.

  11. Researcher discovers distributed bitcoin cracking trojan malware

    A Symantec security researcher is reporting the discovery of a trojan that infects and adds users' computers to a processing swarm designed to brute force decrypt the bitcoin electronic currency system, generating as much as $150.00 per infected computer every month.

  12. SANS Institute's NetWar challenge takes on the US military

    The SANS Institute has expanded its NetWars challenge, which tests information security skills of IT professionals, to include the US military, noted Ed Skoudis, director of the SANS NetWars project.

  13. Infosec expert traces and recovers his laptop - stolen in the London riots - using Google Street View WiFi data

    A technical expert with HP-ArcSight says he was able to track and report his Macbook Pro laptop – stolen in last week's London riots - and assist the police in returning the computer.

  14. Security researcher warns on smartphone juice-jacking risk

    A leading security researcher has warned smartphone users of the risk they run by charging their handset at one of the growing USB-linked 'power stations' that are popping up at airports, shopping malls and other locations across the US, Canada and Europe.

  15. UK IT profession could suffer as postgraduate course fees face huge rises

    The UK IT profession could suffer as a result of the soaring cost of postgraduate courses on the back of rises in the fees for undergraduate studies.

  16. Thales develops on-SIM mobile wallet authentication and encryption technology

    Thales has developed what it claims is the industry's first cryptographic technology capable of running in the memory of a cellular phone's SIM card, meaning that the secure m-wallet function can operate wholly on the SIM card, interacting with secure servers across cellular data channels.

  17. Imperva says hackers are tapping Google's powerful search engine features once again

    Data security specialist claims that cybercriminals are tapping the powerful search features that Google offers, generating more than 80,000 daily queries. This, the firm says, allows the hackers to conduct a significant amount of cyber reconnaissance at little of no cost to themselves.

  18. Source code for SpyEye trojan leaked onto forums and filesharing services

    It seems that the source code for SpyEye – the sister malware to Zeus – has been released on a number of file-sharing sites, as well loaded onto the file areas of a number of darkware forums. The move follows the `sharing' of the source code of Zeus earlier this year, Infosecurity notes.

  19. 2011 UK Infosecurity Virtual Conference – Confirmation of Conference Programme

    We are pleased to announce the details for our Infosecurity 2011 UK autumn virtual conference, to be held on 27th September 2011. This one-day event will bring together a series of topical keynote sessions direct to your computer and gives you the flexibility to learn about the latest information security trends and challenges from wherever you are in the world.

  20. Elite hackers create RankMyHack.com

    A group of hackers have set up a leader board website called - appropriately enough - RankMyHack.com, under which elite hackers can post information on their latest hacks and allow their peers to rank their network and system incursions.

What’s hot on Infosecurity Magazine?