Infosecurity News

  1. Infosecurity Europe 2011: ViaSat launches blistering attack on ICO strategy

    ViaSat, the new name for Stonewood, has analysed more than 2,500 data breaches reported to the Information Commissioner's Office (ICO) and concluded that the ICO needs penalise organisations more for data breaches.

  2. Infosecurity Europe 2011: Panel tacitly endorses BlackBerry for enterprise mobile security

    While a panel of infosec practitioners during one keynote did not go so far as to outright endorse BlackBerry mobile devices, the general consensus was that the handsets from Research In Motion offer greater security for the mobile workforce – above and beyond today’s increasingly popular consumer smart devices, which received mixed reviews on security.

  3. Infosecurity Europe 2011: Cyber Security Challenge 2011/2012 gets rolling

    The Cyber Security Challenge UK 2011/2012 – the second year-long challenge designed to raise awareness of IT security skills amongst students of all ages – is now under way.

  4. Number of compromised records drops precipitously, Verizon finds

    The number of compromised records involved in data breaches plummeted from 144 million in 2009 to only 4 million in 2010, but the number of data breaches soared to its highest number ever, according to the 2011 Verizon Data Breach Investigations Report.

  5. SANS Institute to teach VOIP security course for first time in Europe

    The SANS Institute has announced its intent to offer VOIP security courses in Europe for the first time. Plans call for the course to be offered at the institute's Amsterdam operations centre from May onwards.

  6. Apple releases Safari, Leopard, Snow Leopard security updates

    Apple has released security updates to its Safari web browser as well as its Leopard and Snow Leopard operating systems.

  7. Google says GSA certified its Google Apps for Government under FISMA

    In response to theDepartment of Justice (DoJ) and Microsoft, Google said that the General Services Administration (GSA) had determined that Google Apps for Government was certified under the Federal Information Security Management Act (FISMA), a claim that GSA appears to back.

  8. Whitehall black-on-black text security blunder reveals info on multiple websites

    An elementary security error involving the use of black text on a black background with redacted security documents published on the web effectively made the IT prowess of the Ministry of Defence, and other government departments, a laughing stock over the weekend.

  9. Linkedin social engineering test snares 68% of users

    Trusteer, the in-browser security specialist, recently conducted a honeypot social engineering test on 100 users of LinkedIn, with 68% of users potentially infecting themselves.

  10. Network access control, not perimeter security, should be priority, says Cyber-Ark exec

    Organizations are wasting money beefing up security at the perimeter when they should be focusing on securing access within the network, said Adam Bosnian, executive vice president Americas and corporate development at Cyber-Ark Software

  11. Enterprises ignore cybercrime trends at their peril, says security researcher

    Cybercriminals know the value of data better than the organizations they are targeting, according to a security strategist who studies hacker behavior.

  12. Enterprises ignore cybercrime trends at their peril, says security researcher

    Cybercriminals know the value of data better than the organisations they are targeting, according to a security strategist who studies hacker behaviour.

  13. McAfee, Siemens team to combat critical infrastructure threats

    Information security firm McAfee and industrial giant Siemens are teaming to improve security against malware, such as Stuxnet, that targets industrial control systems running critical infrastructure protection.

  14. Interview: William Barker, chief cyber security advisor, NIST, Dept. Of Commerce

    The inaugural World Cyber Security Technology Research Summit was held at Queen's Centre for Secure Information Technologies (CSIT) in Belfast in March. Of all the delegates that Infosecurity had the pleasure of speaking with, William Barker, chief cyber security advisor NIST, has arguably the most impressive CV.

  15. Android/iPhone app allows spoofed caller ID calls to be made

    A new app for Google Android and jailbroken iPhones allows users to make calls with their own choice of caller ID. Known as SpoofPro, the app routes calls via the company’s servers in the US, allowing any caller ID to be generated.

  16. Feds take down Coreflood botnet

    The Department of Justice (DoJ) and the FBI announced this week the shutdown of the Coreflood botnet that infected more than 2 million computers worldwide with keylogging malware designed to steal financial information from victims.

  17. Cyber-Assisted Physical Attacks are Here and Now says John Bumgarner, US Cyber Consequences Unit

    At the World Cyber Research Summit in Belfast on March 16th, Infosecurity’s Eleanor Dallaway had the opportunity to interview John Bumgarner of the US Cyber Consequences Unit.

  18. Report recommends removing admin rights from end users

    Research just released claims that in order to increase security on an organisation's network, managers should remove admin level rights for end users.

  19. Libyan rebels successfully hack the country's eastern cellular network from the inside

    A group of "expatriate executives and engineers" have quietly wrested control of Libyan's cellular network in the rebel-held areas of the country, allowing officials with the transitional government in the East to communicate wirelessly with each other once again.

  20. Organizations deploying smart devices without understanding security risks

    Close to half of IT professionals surveyed by smart device security firm Mocana said that they did not believe their organizations could adequately manage the security risks posed by smart devices.

What’s hot on Infosecurity Magazine?