Infosecurity News
Interview: William Barker, chief cyber security advisor, NIST, Dept. Of Commerce
The inaugural World Cyber Security Technology Research Summit was held at Queen's Centre for Secure Information Technologies (CSIT) in Belfast in March. Of all the delegates that Infosecurity had the pleasure of speaking with, William Barker, chief cyber security advisor NIST, has arguably the most impressive CV.
Android/iPhone app allows spoofed caller ID calls to be made
A new app for Google Android and jailbroken iPhones allows users to make calls with their own choice of caller ID. Known as SpoofPro, the app routes calls via the company’s servers in the US, allowing any caller ID to be generated.
Feds take down Coreflood botnet
The Department of Justice (DoJ) and the FBI announced this week the shutdown of the Coreflood botnet that infected more than 2 million computers worldwide with keylogging malware designed to steal financial information from victims.
Cyber-Assisted Physical Attacks are Here and Now says John Bumgarner, US Cyber Consequences Unit
At the World Cyber Research Summit in Belfast on March 16th, Infosecurity’s Eleanor Dallaway had the opportunity to interview John Bumgarner of the US Cyber Consequences Unit.
Report recommends removing admin rights from end users
Research just released claims that in order to increase security on an organisation's network, managers should remove admin level rights for end users.
Libyan rebels successfully hack the country's eastern cellular network from the inside
A group of "expatriate executives and engineers" have quietly wrested control of Libyan's cellular network in the rebel-held areas of the country, allowing officials with the transitional government in the East to communicate wirelessly with each other once again.
Organizations deploying smart devices without understanding security risks
Close to half of IT professionals surveyed by smart device security firm Mocana said that they did not believe their organizations could adequately manage the security risks posed by smart devices.
DARPA working on full disk encryption for iPhone and Android
The US military's Defense Advanced Research Projects Agency (DARPA) has announced it is researching into the area of full disk encryption (FDE) on Google Android and Apple iPhone handsets.
Justice Department questions Google's FISMA certification claims
The US Department of Justice said in court documents that the Google Apps for Government cloud-based IT suite was not certified under the Federal Information Security Management Act (FISMA), despite claims by Google that it was.
Sony settles code cracking legal spat with George Hotz
Sony Computer Entertainment America has settled its PS3-related legal spat with the infamous code cracker George Hotz. Also known as Geohot, Hotz is well known for being the first person to jailbreak the Apple iPhone in his mid-teens.
Barracuda Networks website hit by SQL injection attack
Barracuda Networks has become the latest IT security vendor to be hit by an SQL injection attack, but the company has moved swiftly to mitigate the fallout from the attack, as well as confirming that all active passwords for applications remain secure.
ATM hacks: can you trust external cash machines any more?
It looks like cybercriminals have moved their ATM skimming game to its logical conclusion and developed wireless plus miniaturised cash machine add-ons that are indistinguishable from the real thing.
ICO finds NHS Liverpool Community Health breached Data Protection Act
The medical history of 31 children and their mothers was lost by NHS Liverpool Community Health during a premises move in October last year.
iPhone keylogging hackware arrives
The first Apple iPhone keylogging 'utility' has reportedly arrived in the security industry. Ostensibly for legitimate use, iKeyGuard is also being discussed as potential darkware.
Korean financial watchdog probes data breach at Hyundai Capital
South Korea’s Financial Supervisory Service (FSS) has launched a probe into a data breach at Hyundai Capital that affected 420,000 of its customers.
CIOs need IT governance rethink
CIOs will need to rethink their IT governance policies as employees turn to social media tools to collaborate at work, according to research from analyst group Gartner.
Trend Micro identifies $30-a-day Exploits-as-a-Service (EaaS) cloudware
Trend Micro claims to have identified a new type of cloud service that allows a variety of crimeware exploits - botnets, Javascript vulns and PDF exploits to mention but a few - to be rented from the cloud for around $30.00 a day.
A dummie's guide to botnet rentals
Botnets – swarms of infected PCs controlled by a command-and-control server(s) – are becoming big business for cybercriminals and now security researcher Brian Krebs has detailed how crimeware professionals are now renting out sub-swarms for cash.
Malware infected 60 million computers in Vietnam last year
Around 60 million computers in Vietnam were infected with malware last year, about 6.5 million of those infections were from the Conficker virus, according to the Vietnam Informatics Department.
Connecticut hospital loses hard drive with data on more than 90,000 patients
MidState Medical Center in Meriden, Conn., said that it lost a hard drive containing personal information on patients at the hospital. Reports indicate that the number of patients affected is around 93,500.