Infosecurity News
Sophos unveils top 20 Mac malware list
Software security firm Sophos has released a list of the 20 most commonly detected types of malware for Mac users. Topping the list is Mal/ASFDldr-A, malware that comes in the form of malicious media files.
DHS sponsors state and local government cybersecurity center
The Department of Homeland Security (DHS) is launching a cybersecurity center for state and local governments that will cooperate with DHS's National Cybersecurity and Communications Integration Center (NCCIC).
Webroot says online shopping security habits getting worse
You might think that, with IT security awareness rising amongst members of the public, that the general level of security whilst shopping online might also be rising. But according to research just published, this doesn't appear to be the case.
Security researcher Moxie Marlinspike placed on US federal watch list
Leading IT security researcher Moxie Marlinspike has reportedly been placed on a US federal watch list, possibly as a result of being friends with Jacob Appelbaum, the high-profile WikiLeaks volunteer and security researcher, who was detained on an international flight into the US in July of this year.
US Air Force warns of 'devastating' effects of location-aware services
The US Air Force has warned troops that using location-aware applications on social networking sites could have "devastating" consequences for military operations.
Privileged account security examined in next Thursday's webinar
The role of privileged account security is the subject of Infosecurity's upcoming webinar, which takes place next Thursday afternoon. Speakers lined up for the event include Bob Tarzey, an analyst and director with Quocirca, as well as Richard Walters, chief technology officer with Overtis, the sponsor of the event.
DRM technology now needed for data archiving security
Digital Rights Management (DRM) technology is not only being used to protect organisation's intellectual property rights, but is now also needed in the data archiving industry, says a DRM expert.
SHA-1 crypto protocol cracked using Amazon cloud computing resources
A German hacker has successfully cracked a six-character implementation of the 160-bit SHA-1 crypto algorithm using a cloud computing resource. The hack was completed in 49 minutes at a cost of just $2.10.
Government suppliers may be ordered to open up data
Private companies may be required to open up data and make their activities answerable to Freedom of Information (FoI) law when they are contracted to work for the public sector.
Winners of the 5th Global Security Challenge Announced
The organisers of this year's 5th Global Security Challenge have announced the two winners of the competition, which means the pair of firms – classed as most promising security companies in the world – will share $500 000 investment provided by the US Department of Defense.
Kodak Gallery service being side-hacked by eBay fraudsters
Fraudsters on eBay are reportedly side-hacking the Kodak Gallery service using a fake redirect technique.
ZeuS now targeting enterprise access gateways
After plundering users' online bank accounts using stolen credentials, it seems that the continually evolving ZeuS malware is now targetting company data assets via their enterprise access gateways.
Desktop security model needs revamping, says Comodo CEO
The desktop security business model needs to evolve to actually prevent new malware infections, not just block old ones or clean up already infected machines. This is according to Comodo CEO and president Melih Abdulhayoglu.
Network forensic capabilities fall well short of need
Nearly all of the security professionals surveyed by Solera Networks said they need real-time situational awareness, known as network forensics, to make their networks more secure, yet only 19% said they have this capability.
Rootkit defeats Microsoft Windows 64-bit security features
The latest version of a rootkit targeting Microsoft Windows has begun hitting 64-bit versions of the operating system.
CSA Congress 2010: Cloud security means social challenges, not just a business ones
Rather than speaking solely about the business challenges inherent with cloud security, Microsoft’s Scott Charney chose to address the social implications of cloud-based computing during his opening keynote address at today’s Cloud Security Alliance (CSA) Congress in Orlando.
Police close down Fitwatch website for advice to student protestors
Police have forced the suspension of a website that offered advice to students photographed at last week's student fees demonstration in London.
Florida hospital admits to data breach affecting 1500 patients
A data breach at Holy Cross Hospital in Ft. Lauderdale, Fla., resulted in the theft of sensitive information concerning 1500 patients who visited the hospital’s emergency room.
$2m-a-year Koobface network downed after concerted international effort
The command and control servers for a Koobface botnet swarm, which reportedly raked in $2 million a year for its operators, were closed down late Friday UK time, following a concerted effort by industry experts and law enforcement officials on both sides of the Atlantic.
Wireless eavesdropping – not just for intelligence peeps anymore
Eavesdropping of mobile communications, once a tool mainly available to only the intelligence community, has transformed into a widely available criminal enterprise, says two security experts from SRA International.