Infosecurity News

  1. Transition to IPv6 poses information security challenges, says Fortinet

    Information security challenges are confronting organizations as they transition from IPv4 to IPv6, according to Patrick Bedwell, vice president of product marketing at network security appliance provider Fortinet.

  2. Oak Ridge National Lab shuts down internet access after phishing attack

    A phishing email attack that injected data-stealing malware into its networks forced the Oak Ridge National Laboratory to shut down internet access and email last week, according to news reports.

  3. Terrorists using bluetooth for subversive and illegal information relay

    Al Qaeda - AQ - is now using bluetooth broadcasting to radiate terrorist material between users' mobiles. The technology has been successfully used by the terrorist organisation to broadcast subversive promotional videos and material, including ritual beheadings, on a pocket-to-pocket basis between cellphone users.

  4. BlackBerry's security strategies revealed

    Some observers have criticised the PlayBook, the BlackBerry tablet computer, which was unveiled this week, for not having on-tablet email and allied office functions. But, says Nader Heinen, a security advisor with BlackBerry's security group, there's a reason for this omission - security.

  5. Infosecurity Europe 2011: Consumerisation of IT is a fact of security life, says Lord Erroll

    Organisations must accept change, embrace consumerisation of IT, and ensure security by focusing on the most sensitive data, says Merlin Lord Erroll.

  6. Microsoft to disclose third-party vendor product flaws

    Microsoft said it will begin disclosing third-party bugs as part of a revamping of its vulnerability disclosure practices.

  7. Infosecurity Europe 2011: Panel tacitly endorses BlackBerry for enterprise mobile security

    While a panel of infosec practitioners during one keynote did not go so far as to outright endorse BlackBerry mobile devices, the general consensus was that the handsets from Research In Motion offer greater security for the mobile workforce – above and beyond today’s increasingly popular consumer smart devices, which received mixed reviews on security.

  8. Infosecurity Europe 2011: ViaSat launches blistering attack on ICO strategy

    ViaSat, the new name for Stonewood, has analysed more than 2,500 data breaches reported to the Information Commissioner's Office (ICO) and concluded that the ICO needs penalise organisations more for data breaches.

  9. Infosecurity Europe 2011: Panel tacitly endorses BlackBerry for enterprise mobile security

    While a panel of infosec practitioners during one keynote did not go so far as to outright endorse BlackBerry mobile devices, the general consensus was that the handsets from Research In Motion offer greater security for the mobile workforce – above and beyond today’s increasingly popular consumer smart devices, which received mixed reviews on security.

  10. Infosecurity Europe 2011: Cyber Security Challenge 2011/2012 gets rolling

    The Cyber Security Challenge UK 2011/2012 – the second year-long challenge designed to raise awareness of IT security skills amongst students of all ages – is now under way.

  11. Number of compromised records drops precipitously, Verizon finds

    The number of compromised records involved in data breaches plummeted from 144 million in 2009 to only 4 million in 2010, but the number of data breaches soared to its highest number ever, according to the 2011 Verizon Data Breach Investigations Report.

  12. SANS Institute to teach VOIP security course for first time in Europe

    The SANS Institute has announced its intent to offer VOIP security courses in Europe for the first time. Plans call for the course to be offered at the institute's Amsterdam operations centre from May onwards.

  13. Apple releases Safari, Leopard, Snow Leopard security updates

    Apple has released security updates to its Safari web browser as well as its Leopard and Snow Leopard operating systems.

  14. Google says GSA certified its Google Apps for Government under FISMA

    In response to theDepartment of Justice (DoJ) and Microsoft, Google said that the General Services Administration (GSA) had determined that Google Apps for Government was certified under the Federal Information Security Management Act (FISMA), a claim that GSA appears to back.

  15. Whitehall black-on-black text security blunder reveals info on multiple websites

    An elementary security error involving the use of black text on a black background with redacted security documents published on the web effectively made the IT prowess of the Ministry of Defence, and other government departments, a laughing stock over the weekend.

  16. Linkedin social engineering test snares 68% of users

    Trusteer, the in-browser security specialist, recently conducted a honeypot social engineering test on 100 users of LinkedIn, with 68% of users potentially infecting themselves.

  17. Network access control, not perimeter security, should be priority, says Cyber-Ark exec

    Organizations are wasting money beefing up security at the perimeter when they should be focusing on securing access within the network, said Adam Bosnian, executive vice president Americas and corporate development at Cyber-Ark Software

  18. Enterprises ignore cybercrime trends at their peril, says security researcher

    Cybercriminals know the value of data better than the organizations they are targeting, according to a security strategist who studies hacker behavior.

  19. Enterprises ignore cybercrime trends at their peril, says security researcher

    Cybercriminals know the value of data better than the organisations they are targeting, according to a security strategist who studies hacker behaviour.

  20. McAfee, Siemens team to combat critical infrastructure threats

    Information security firm McAfee and industrial giant Siemens are teaming to improve security against malware, such as Stuxnet, that targets industrial control systems running critical infrastructure protection.

What’s hot on Infosecurity Magazine?