Infosecurity News

  1. Programmers must be literate, Donald Knuth tells IET in Turing Lecture

    Software quality would be much better if programmers adopted "literate programming", according to Stanford University's unique professor emeritus for the art of computer programming, Donald Knuth.

  2. Programmers must be literate, Donald Knuth tells IET in Turing Lecture

    Software quality would be much better if programmers adopted "literate programming", according to Stanford University's unique professor emeritus for the art of computer programming, Donald Knuth.

  3. Google and Twitter join forces to beat Egyptian internet blackout

    Google and Twitter have joined forces to enable Egyptians to tweet using the phone to bypass a government-imposed internet blackout.

  4. Watch out for Super Bowl scams in your trash-talking tweets

    No matter which team you root for in the Super Bowl this Sunday, be careful of scams that might be lurking in your trash-talking tweets or other online communication, warns Mark Maciw, web product manager at Clearswift.

  5. Hackers could take a security bite out of Android Gingerbread

    Researchers at North Carolina State University have discovered a flaw in the Android 2.3 Gingerbread mobile operating system that allows hackers to gain access to information on the phone's microSD storage card.

  6. Kaspersky Lab hit by anti-virus software source code leak

    Source code that apparently relates to v8 of Kaspersky anti-virus has appeared on BitTorrent and other file-sharing sites in the last few days. According to news wire reports, the source code was leaked by an employee of the IT security vendor who is now in jail for intellectual property theft.

  7. Poor firewall implementations pave wave for DDoS attacks

    Research published today claims to show that the increasing problem of distributed denial of service (DDoS) attacks has been made worse by a tendency to misconfigure firewalls and intrusion prevention systems (IPS).

  8. NewNet Communication purchases encryption specialist Traxcom

    Privately held network communications supplier NewNet Communication has acquired another business from within its own parent company – secure transactions provider Traxcom Technologies. The move is expected to strengthen the security of NewNet’s mobile commerce offerings.

  9. Belgacom taps CyberArk for privileged ID management in the cloud

    CyberArk has landed a prestigious project for protecting critical applications, identities and information in Belgacom's data centres in Belgium.

  10. Indian government threatening BlackBerry ban again

    India may yet ban BlackBerry services after maker Research In Motion (RIM) said it was technically impossible to give government access to corporate e-mails.

  11. Lax compliance costs more than strict compliance with security rules

    Noncompliance costs organizations almost three times as much as compliance with information security regulations and standards, according to a new study by the Ponemon Institute and Tripwire.

  12. Assange reveals WikiLeaks back-up plan

    WikiLeaks founder Julian Assange has revealed a back-up plan to continue releasing secrets if the whistle blowing website is shut down.

  13. Symantec is Marmite, says Spamina

    “The love hate relationship between the very large vendors like Symantec and their potential customers, leaves the door open for smaller email security companies”, Jim Tyer, international sales manager of Spamina, a Spanish email security company, told Infosecurity.

  14. Internet darkness hits Egypt - but there's always dial-up

    It's been a very sad weekend for Egypt on several fronts, but many internet watchers will have been dismayed to see the internet in that country going dark, with most of the country's ISPs effectively turning of their network resources.

  15. Kaspersky Lab hit by AV software source code leak

    Source code that apparently relates to v8 of Kaspersky Anti-virus has appeared on BitTorrent and other file-sharing sites in the last few days. According to newswire reports, the source code was leaked by an employee of the IT security vendor who is now in jail for intellectual property theft.

  16. Finalists decided for Cyber Security Challenge

    Simon Walker, a software consultant from Tring, Hertfordshire, has won the penultimate individual event in the 2010 Cyber Security Challenge UK.

  17. Assange reveals Wikileaks back-up plan

    WikiLeaks founder Julian Assange has revealed a back-up plan to continue releasing secrets if the whistleblowing website is shut down.

  18. FBI issues search warrants for WikiLeaks ‘Anonymous’ gang

    The FBI has announced the execution of 40 search warrants throughout the US for information relating to the distributed denial-of-service (DDoS) attacks carried out by the pro-WikiLeaks group known as ‘Anonymous’.

  19. PCI Council taking nominations for advisory board

    The Payment Card Industry Security Standards Council (PCI SSC) is currently seeking nominations from participating organizations for 14 open seats on its Board of Advisors.

  20. Smartphones and social media can be a risky combination

    By visiting social media sites, smartphone users are exposing themselves to security risks, warned Avi Chesla, vice president of security at Radware.

What’s hot on Infosecurity Magazine?