Infosecurity News

  1. Don't open PDFs, Apple warns iPhone, iPad and iPod users

    Apple has advised users of all its mobile devices that run on iOS to avoid opening PDFs until a fix is released for a newly discovered flaw.

  2. Detecting source rather than code is key, says Trend Micro

    From their Silicon Valley office, David Perry, global education director of Trend Micro, told Infosecurity that it’s no longer sufficient to detect code, but instead, it’s more productive to detect the source of the code.

  3. Microsoft to release emergency security fix

    Microsoft plans to release an emergency security update for Windows today to patch a recently reported vulnerability in the way the operating system creates desktop shortcuts.

  4. Cloud adoption starting to take off amongst SMBs says study

    Research just released claims to show that a growing number of small to mid-sized businesses are starting to embrace the benefits of cloud computing technology, with 14% having adopted the platform by the end of June of this year.

  5. Cloudmark launches free standalone spam filter

    Today sees anti-spam specialist Cloudmark launching its free standalone spam filter – Cloudmark DesktopOne. The software, which has been on beta test since April of this year, is unusual in its ability to filter webmail services, as well as POP3 and IMAP email.

  6. McAfee bolsters mobile offerings by acquiring tenCube

    The world’s largest dedicated IT security firm became just a little bit bigger today, as McAfee announced plans to purchase tenCube, the privately owned provider of the WaveSecure mobile security service.

  7. Black Hat: General Michael Hayden unsurprised at cyber warfare

    In his keynote at Black Hat, 29th July 2010, retired General Michael Hayden, who served as director of the CIA and deputy director of National Intelligence, says cyber warfare was inevitable considering the internet has not been built with defense in mind.

  8. ISF shares its security risk predictions

    Rather than consulting a crystal ball, the Information Security Forum (ISF) looked to experts in the field – including those from its member organizations – to develop a set of security risk predictions for 2012 and beyond.

  9. Apple iPhone jailbreaking is 'okay under EU law'

    Jailbreaking Apple iPhones to bypass code aimed at limiting the applications and carriers owners can use is unlikely to violate EU copyright laws.

  10. Black Hat 2010: Qualys releases BlindElephant application analysis security tool

    Qualys has taken the wraps off BlindElephant, an application security utility that analyses web applications running on company systems and is billed as allowing security professionals and systems administrators to identify everything running on their servers, including any web applications users may have downloaded.

  11. Facebook 'hack' releases 100 million user details onto filesharing sites

    A privacy storm is brewing following the collation and publication on filesharing services of the details of around 100 million Facebook users by a security researcher.

  12. Black Hat 2010: Microsoft and Adobe collaborate to share vulnerability information

    At Black Hat Las Vegas, 28th July 2010, Microsoft announced that it will extend its Microsoft Active Protections Program (MAPP) to include vulnerability information sharing from Adobe Systems.

  13. Suspected Mariposa botnet author arrested

    A 23-year-old Slovenian man – thought to be the author and creator of the infamous Mariposa (butterfly) botnet – has been arrested by Slovenian police, working in concert with their colleagues from Spain and a team from the FBI.

  14. Suspected Mariposa botnet author arrested

    A 23-year-old Slovenian man – thought to be the author and creator of the infamous Mariposa (butterfly) botnet – has been arrested by Slovenian police, working in concert with their colleagues from Spain and a team from the FBI.

  15. Commerce Secretary looks to improve cybersecurity in commercial sector

    Speaking at a cybersecurity symposium in Washington yesterday, US Commerce Secretary Gary Locke called on commercial, academic and public sector interests to submit their ideas on mitigating cyber threats in the commercial sphere, without stifling innovation in the internet economy.

  16. Cybercriminals tap online automated services to check fraud effectiveness

    The increasing automation of online frauds has been extended into the field of fraud effectiveness checks, as virus authors and botmasters are said to be using automated tools to verify the effectiveness of their fraudulent activities.

  17. Cybercriminals tap online automated services to check the effectiveness of their frauds

    The increasing automation of online frauds has been extended into the field of fraud effectiveness checks, as virus authors and botmasters are said to be using automated tools to verify the effectiveness of their fraudulent activities.

  18. 88% of UK IT managers concerned over customer online security fears

    Research just released claims to show that IT staff are spending their resources on security to ease customer concerns and establish better levels of online trust.

  19. UK launches Cyber Security Challenge

    The UK has officially launched its Cyber Security Challenge to find and attract new talent to the IT security industry.

  20. ISACA says no to mandatory real-time reporting of data breaches – suggests financial accounting approach

    ISACA, the not-for-profit IT security association, has given a qualified 'thumbs up' to suggestions that UK companies should be required to report their all of their data breaches and losses, but it is recommending that reports should be included in company financials, which are issued on a quarterly and annual basis.

What’s hot on Infosecurity Magazine?