Infosecurity News

  1. Trusteer claims to have wiped banking malware from 1.6 million users' PCs.

    In-browser security specialist Trusteer is reporting that, a year after adding malware removal to its Rapport software, it has successfully removed banking trojans and similar malware from around 1.6 million users' PCs.

  2. Black Hat 2011: Google Android as vulnerable to drive-by downloads as PCs claims Dasient Research

    Dasient Research claims that mobile apps running on the Android platform are as vulnerable to drive-by download security attacks as the software loaded onto desktop PCs.

  3. Black Hat 2011: Busting a security myth – Macs more vulnerable to network attacks

    With organizations off all stripes seeking to defend against advanced persistent threats (APTs), a team of researchers from iSEC Partners put the Mac OS X operating system head-to-head with Windows to see how each performs in the realm of enterprise security.

  4. New Android botnet Identified

    The world of security threats is changing, as the smartphone is now entering the frame as a vehicle for security attacks. That's the underlying message from the latest Fortinet threat landscape report, which claims that a new Android botnet has been seen in the wild.

  5. NIST seeks help in testing iPad, iPhone security for government use

    The National Institute of Standards and Technology (NIST) is launching a pilot program to test the security of the Apple iPad and iPhone for government use.

  6. Webroot offers free mobile banking security to Android users

    Webroot has extended its mobile security applications to its partners in banking in order to protect their customers who use tablets and smartphones to conduct mobile banking.

  7. Fake AV software is fading in profit and frequency says researcher

    A leading security researcher claims that the volume - and profitability - of fake anti-virus software is now on the wane. But, he adds, there is still a lot of activity in the market, so users cannot breathe that easily just yet.

  8. Sun website hack: ICO investigates whilst News International apologises

    Following on from the hacking of the Sun newspaper's website last month, in which false news stories were posted, it appears that thousands of customer's details were downloaded during the hack.

  9. CA researcher spots Android trojan that records user's phone calls

    A Computer Associates researcher has spotted a trojan for the Google Android platform that quietly records user's phone calls for later possible cybercriminal usage.

  10. New Mac trojan spotted hidden inside fake Flash updater

    F-Secure's research team claim to have spotted a fake FlashPlayer.pkg installer for the Apple Mac. When executed, the 'installer' reveals itself to be a Bash/QHOst.WB trojan.

  11. Facebook to offer bug bounties for security researchers

    Late last week Facebook unveiled its new security bug bounty program whereby the social network will offer security researchers payment for reporting certain vulnerabilities.

  12. 10 days to track down a stolen iPhone in Australia

    A 19-year-old sales clerk in Australia has successfully retrieved her iPhone 4 after it was stolen from a cash register at work. What makes the case unusual is that the handset was sold on by the original thief, yet it was still traceable using the onboard GPS-driven software.

  13. Windows XP is operating system of choice for rootkit infections

    Although it may be two steps behind in terms of Windows releases, a study by AVAST Software indicates that Windows XP is still the main vector for rootkit infections.

  14. Belmont Savings Bank pays fine for losing personal data of 13,000 customers

    Belmont Savings Bank has agreed to pay a fine of $7,500 for losing personal information of more than 13,000 customers, according to a settlement with the Massachusetts Attorney General’s office.

  15. Why the High Court ruling in the Newzbin2 case is such a big deal

    The creative industries have welcomed the UK High Court ruling that BT must block access to pirated content aggregator site Newzbin2, but why is the ruling seen as such a game changer?

  16. Most organizations do not follow security best practices, survey finds

    A majority of organizations are not applying information security best practices, according to a survey by Venafi, an enterprise key and certificate management firm, and research firm Echelon One.

  17. Safari, Firefox, and Chrome disappoint in browser security testing, as IE9 stands out

    The Apple Safari 5, Mozilla Firefox 4, and Google Chrome 10 browsers each caught only 15% of live socially engineered malware samples, according to NSS Labs’ tests of web browser protection for European users.

  18. Hackers raid 35 million South Korean website accounts

    Hackers have stolen personal data from 35 million accounts at a South Korean social networking site and a web services portal, in the latest of a series of cyber attacks on government and financial firms.

  19. BeyondTrust makes yet another purchase – scoops up GentleSecurity

    Carlsbad, Calif.-based BeyondTrust announced its latest in a string of deals – this time acquiring DLP specialists GentleSecurity of Luxembourg.

  20. Pirate link aggregator Newzbin vows to retaliate against blocks

    The resurrected Newzbin website that aggregates links to pirated films has threatened to break BT's internet filtering system if any attempts are made to block the site.

What’s hot on Infosecurity Magazine?