Infosecurity News

  1. VA facilities violate prohibition on using online tools to share patient data

    A number of VA facilities have violated the Department of Veterans Affairs (VA) prohibition on using online tools to share patients’ information among facilities.

  2. $4.99 256-bit encrypted VOIP application arrives on the iPhone

    Although military-grade encrypted VOIP software for the iPhone has been around for while, the highly specialised software has been quite expensive, typically running into three figures. Now a Florida-based firm has released a 256-bit encrypt VOIP app for the iPhone costing just $4.99.

  3. FTC clears $7.7bn Intel acquisition of McAfee

    The Federal Trade Commission (FTC) has approved Intel's $7.7bn acquisition of security software giant, McAfee.

  4. BitTorrent links with BitDefender for integrated IT app security

    IT security software vendor BitDefender has linked up with peer-to-peer data development company BitTorrent – which developed the file-sharing protocol of the same name – to offer the 80 million estimated users of the protocol an integrated malware detection service.

  5. Inadvertent data disclosure by employees poses growing risk

    Inadvertent disclose of sensitive information by well-meaning workers will pose the greatest information security threat to organizations in the coming year, according to Frank Kenney, vice president of global strategy at Ipswitch.

  6. Google says sorry, deletes all UK Street View WiFi data

    Google has deleted all UK payload data collected by its Street View cars from unsecured British WiFi networks, the company has confirmed.

  7. DARPA develops technology to prevent surprise cyberattacks

    The Defense Advanced Research Projects Agency (DARPA) is undertaking a number of cybersecurity research and development projects for the Department of Defense designed to prevent surprise cyberattacks.

  8. Bredolab botnet revealed by Kaspersky Lab analyst

    Kaspersky Lab's malware analyst Alexei Kadiev has posted an interesting analysis on how the Bredolab botnet – which infected around 30 million PCs at its height – functioned.

  9. Symantec researcher spots C&C botnet toolkit in the wild

    Security researchers from Symantec claim to have spotted a new crimeware toolkit being sold in the underground marketplace. The toolkit – known as Dream Loader – generates a trojan that is exclusively used to distribute malware.

  10. Hotmail tries to plug phishing with Active Views

    Hotmail is claiming it can now tackle its biggest security issues with a way to send and receive active e-mail messages.

  11. Imperva CEO says DRM and cloud security will be key defences against rising cyberthreats in 2011

    Shlomo Kramer is well known in the IT security industry for being a co-founder of Check Point and, more recently, has been CEO/president of data security specialist Imperva. Infosecurity caught up with him in London this week for his observations – and predictions – on what will be the main IT security threats in 2011.

  12. Facebook intros automated photo-tagging; creates social networking risk says security researcher

    A new feature on Facebook is, at the very least, questionable, and may even be a social networking risk, says a leading IT security researcher.

  13. For the information security professional who has everything

    Wondering what to give your loved one who just happens to be an information security professional? Why not give him or her the 12 principles of information security developed by the three leading information security organizations.

  14. Court blocks former Bank of America employees from using client data

    Bank of America recently won a ruling blocking four former employees of its U.S. Trust unit from using the bank’s client information at their new employer, Dynasty Financial Partners.

  15. Hackers gain access to Ohio State server with 760,000 personal records

    The Ohio State University said that a university server containing personal information on 760,000 people was accessed by hackers. The university stressed that it had no information that the personal information was taken from the server.

  16. Open Group backs initiative to protect supply chain from cybercrime

    Leading technology businesses are backing an initiative to help organisations secure global supply chains against cybercrime threats.

  17. Smartphone malware infections jump 33% in 2010

    The number of smartphone malware infections have increased 33% this year over 2009 figures, according to a survey by network-based security provider AdaptiveMobile.

  18. Antid0te expected to close the security door on jailbroken iPhone

    Antid0te, a tool developed by security researcher Stefan Esser, is expected to provide security protection against worms that attack a jailbroken iPhone.

  19. CA Technologies' CTO says cloud security will be a hot issue in 2011

    Cloud security has been something of a hot topic so far this year but, according to Colin Bannister, CA Technologies' chief technology officer, it will be even more of a hot topic on company agendas as we move into the New Year.

  20. ATM skimmers get GSM equipped, making them more dangerous says security expert

    It seems that ATM skimmers – fraudsters who attach magnetic stripe skimming devices to cash machines – have moved up a notch or two in the technology stakes by adding GSM-equipped data modems to their readers.

What’s hot on Infosecurity Magazine?