Infosecurity News
RSA Europe: Defend against cyberwar by re-architecting networks, not buying more technology, says Richard A. Clarke
Investing money in re-architecting our networks and systems is the most effective way to defend against cyberwar, said Richard A. Clarke, chairman, Good Harbor Consulting, in his keynote today at RSA Europe.
RSA Europe: Suppliers urged to embed security technology in consumer services
Security suppliers can help improve overall internet security by embedding technologies in consumer-facing services, says RSA president Art Coviello.
RSA Europe: Suppliers urged to embed security technology in consumer services
Security suppliers can help improve overall internet security by embedding technologies in consumer-facing services, says RSA president Art Coviello.
New, harder-to-detect Bugat malware used in LinkedIn attacks
IT security researchers have warned of the emergence of a new, better-hidden version of the Bugat financial malware used to commit online fraud.
Stuxnet malware is a paradigm shift in the war to protect critical infrastructure
The Stuxnet malware that has attacked Iranian nuclear facilities and Chinese computers is a “paradigm shift” in the war to protect critical infrastructures around the global, warns the European Network and Information Security Agency (ENISA).
British firms warned over laptop data lethargy
A survey just completed claims to show that around two-thirds (65%) of IT managers have no idea where their organisation's mobile devices are, and that almost half of respondents are unable to manage PCs and Macs together.
Spammers tap soft hyphens to beat email intercept security
It seems that spammers are starting to use the so-called 'SHY' character – aka a soft hyphen – to fool IT security applications into allowing email applications to allow click-throughs to suspect web pages.
Monthly cyber attacks against Australian military networks more than tripled this year
The Australian military has seen cyber attacks against its networks jump from 200 per month last year to 700 attacks per month this year, according to the Australian Defence Signals Directorate.
Information security is not just about gizmos and gadgets
Information security is not just about technical solutions, such as hardware and software. It is also about policies and process companies put in place to ensure technical solutions fit in with the broader corporate information security strategy. To provide that broader scope, the Information Systems Audit and Control Association (ISACA) has developed a comprehensive business model for information security.
Fannie Mae contractor faces jail term for planting malware
A former Unix engineer faces 10 years in jail for planting a malicious script designed to destroy data at troubled mortgage giant, Fannie Mae.
FBI thwarts data breach at Akamai Technologies
A potential data breach at Akamai Technologies was foiled by the Federal Bureau of Investigation (FBI), prosecutors disclosed this week.
Adobe shares surge on reports of possible Microsoft takeover
Adobe Systems shares surged 12% after the New York Times said Microsoft may work more closely with the company and possibly acquire it.
Prevx signs McAfee CTO as president – plans for tiny footprint cloud-based software
Up and coming IT security vendor Prevx has just signed Christopher Bolin, a former CTO with McAfee, as its new president, and Infosecurity caught up with him this week to discuss his gameplan.
Spammers tap soft hyphens to beat email intercept security
It seems that spammers are starting to use the so-called 'SHY' character – aka a soft hyphen – to fool IT security applications into allowing email applications to allow click-throughs to suspect web pages.
Adobe shares surge on reports of possible Microsoft takeover
Adobe Systems shares surged 12% after the New York Times said Microsoft may work more closely with the company and possibly acquire it.
Mozilla Firefox trojan hacks browser to store passwords
Mozilla Firefox is one of the most popular browser clients currently in use and, as a result is attracting the attentions of hackers, some of whom have developed a keylogger trojan that forces the client to store passwords automatically.
Anonymous cyber-protest group stages DDOS attack on Spain's copyright society
An online activist group – apparently using the 4Chan web portal as its forum – started a major distributed denial of service attack (DDOS) at around midnight CET yesterday evening against the web portal of the Spanish copyright protection society, the SGAE.
Global standard needed for credit card data encryption, PCI council says
A global standard is needed for point-to-point encryption (P2PE) technology used to secure credit card transactions, according to Troy Leach, chief standards architect at the PCI Security Standards Council. Standards are needed to ensure consistency and enable verification of the technology’s performance, he said.
iPhone UDID raises data privacy issues
The unique device identifier (UDID) on an iPhone can be used in collecting data that poses privacy concerns, warns Bucknell professor Eric Smith.
ISSE 2010: IT world needs independent security standards
IT security standards are mainly set by dominant technology suppliers, rather than independent organizations, according to a German information security official.