Infosecurity News
Smartphones with touch screens may be vulnerable to smudge attacks
Research carried out by the University of Pennsylvania claims to show that it possible to make an intelligent guess as to a smartphone users' handset password by the density and direction of the `smudges' on the mobile's touch screen.
CESG adopts IISP skills framework for Information Assurance
CESG, the national technical authority for information assurance across the public sector, has announced it is adopting the Institute of Information Security Professionals (IISP) skills framework as the basis for its own professional skills and competency programme.
Microsoft holds off on patching latest security vulnerability
A representative from the Microsoft Security Response Center said the company is investigating the security flaw disclosed earlier this week but that it will not issue a separate advisory based on current information.
Explosion of data driving information security industry
In ArcSight’s Silicon Valley office, Rick Caccia, the infosec firm’s vice president of product marketing, tells Infosecurity’s editor, Eleanor Dallaway, that in addition to the constant tide of cybercrime, it’s huge amounts of data that are driving this industry.
Hackers are winning the cat-and-mouse game against anti-virus programmers
Ever since malware writers swapped worldwide infamy for hefty profits, they have become a larger problem to deal with. And, says Ron Clarkson, senior vice president of CoreTrace, as the game of cat-and-mouse with anti-virus software programmers continues, hackers remain one step ahead of their chief nemesis.
Explosion of data driving information security industry
In ArcSight’s Silicon Valley office, Rick Caccia, the infosec firm’s vice president of product marketing, tells Infosecurity’s editor, Eleanor Dallaway, that in addition to the constant tide of cybercrime, it’s huge amounts of data that are driving this industry.
Adobe issues security updates for Flash, hotfix for ColdFusion
Three security bulletins were released this week by Adobe outlining security updates for Flash Player, ColdFusion, and Flash Media Server.
Hackers are winning the cat-and-mouse game against anti-virus programmers
Ever since malware writers swapped worldwide infamy for hefty profits, they have become a larger problem to deal with. And, says Ron Clarkson, senior vice president of CoreTrace Corporation, as the game of cat-and-mouse with anti-virus software programmers continues, hackers remain one step ahead of their chief nemesis.
E-crime victim charity to close
Veteran technology professional Jennifer Perry has announced that E-Victims.org, the charity she helped to found three years ago and which assists victims of electronic crime on the internet, is to close due to lack of funding.
How to take down rogue ISPs
McAfee has released the sixth edition of its security journal and has been fortunate enough to have a feature contribution from ex-Washington Post IT security writer Brian Krebs, who has written about his experiences in taking down ISPs and botnets that support cybercriminal activity.
German government looking to dump BlackBerry and other smartphones
Reports are coming in that the German government is becoming concerned over the security of the 'push' email features of several popular smartphones, including the RIM BlackBerry and the Apple iPhone.
Toshiba announces Wipe technology for self-encrypting disk drives
In a move that could upset a few security vendors, Toshiba has announced it has developed a new technology for self-encrypted hard disk drives and protecting sensitive information.
Bahrain refuses to join BlackBerry ‘ban wagon’
The country’s foreign minister told the AP that Bahrain has no plans to join other Gulf states in threatening to block BlackBerry services.
Android phones hit by text-based trojan
Google's Android mobile operating system has been hit by its first text-based trojan, according to security firm Kaspersky Labs.
Kaspersky warns internet users about TDSS rootkit malware
Kaspersky Lab is warning users to check their PCs for the presence of the TDSS rootkit, a nasty piece of code – now in its third iteration – that allows complete, but hidden, 'zombie' control of the host PC.
Android phones hit by text-based Trojan
Google's Android mobile operating system has been hit by its first text-based Trojan, according to security firm Kaspersky Labs.
St. Bernard acquires Red Condor
San Diego-based St. Bernard Software recently announced its purchase of email security firm Red Condor.
Four-year prison sentence for San Francisco network administrator
Terry Childs, a former city of San Francisco network administrator, received a four-year sentence on Friday for his earlier conviction on computer tampering charges.
Google image search being infected by hackers
There are signs that hackers are again turning to the recurring avenue of using attractive image files as a means to persuade internet users to infect their machines, through the usage of downloadable links to 'allow' users to view the files.
DefCon 2010 hack of cellular networks shows evil twin methodology
Reports from DefCon 2010 last weekend showed how it is possible to persuade a mobile phone to log into a rogue base station created using around $1,500 worth of hardware. And, says an IT security vendor, this highlights how the 'evil twin' hacking methodology used on WiFi networks can be redeployed for use in mobile hackery.