Infosecurity News

  1. Terry Childs convicted in San Fran network case

    Things are not looking good for Terry Childs, the former San Francisco network administrator who compromised the city's network and essentially held it to ransom. Childs was convicted of computer tampering this week, and now faces up to five years in jail.

  2. Storm worm returns to internet

    Security researchers have identified a new version of the Storm worm that plagued the internet three years ago. The new version uses HTTP for command-and-control purposes instead of the original peer-to-peer approach, say reports.

  3. FBI names new cybercrime director

    The FBI has promoted Gordon M. Snow as assistant director of its Cyber Division, saying that the bureau’s highest priority in the criminal sphere is combating cybercrime.

  4. Israel lifts Apple iPad ban

    Israel has lifted a ban on imports of Apple's iPad, which was imposed because authorities said the device's Wi-Fi system was incompatible with Israel's wireless standard.

  5. Kaspersky Lab host infosec student event in Poland

    Kaspersky Lab has announced it will be hosting an IT security student conference in Krakow, Poland, on May 23/24. The event - titled 'IT Security for the Next Generation' - forms part of the Kaspersky academy education programme.

  6. Blippy suffers credit card number leak

    Shoppers’ social networking service Blippy suffered a security flaw late last week, after some of its users’ credit card numbers began appearing in search results.

  7. Microsoft wins piracy battle in China

    Microsoft has won its first big piracy battle in China against a Shanghai-based insurer.

  8. McAfee blames QA process change for faulty update

    Companies around the world have been forced to clean up thousands of computers after the flawed McAfee anti-virus update released on Wednesday caused chaos.

  9. Flash-based client device identification on the way out

    Gartner has warned that the use of Flash local storage as a means of verifying end-user devices for security purposes is coming to an end.

  10. Lancashire Constabulary taps into secure virtual desktop technology

    Lancashire Constabulary has implemented a secure virtual desktop environment to manage staff access to its restricted and confidential networks.

  11. Researchers develop GPS-free phone tracking hack

    Security researchers have discovered a way to track a mobile phone user's whereabouts without using a GPS signal, it was revealed this week. It is even possible to listen in on telephone voicemails, according to the information, divulged in a presentation at the SOURCE Boston security conference this week.

  12. McAfee security software flags Windows kernel code as malware

    Reports are coming in that McAfee's popular IT security software is tagging Microsoft Windows system files as malicious, causing serious stability problems, screen freezes and bootup loops for a large number of Windows XP users.

  13. Google fixes Chrome flaws

    Google has closed four high-priority vulnerabilities in version 4 of its Chrome browser for Windows.

  14. McAfee's security software flags Windows kernel code as malware

    Reports are coming in that McAfee's popular IT security software is tagging Microsoft Windows system files as malicious, causing serious stability problems, screen freezes and bootup loops for a large number of Windows XP users.

  15. Lib Dem Clegg’s infosec breach

    The blueprint for Lib Dem Nick Clegg's top-secret TV debate strategy has been found in the back of a London cab, The Sun reports

  16. Clearswift reports a seachange in Web 2.0 business security attitudes

    Research published today claims to show that business attitudes towards Web 2.0 – the new generation of internet services – have charged markedly in the last three years.

  17. UN rejects international cybercrime treaty

    The United Nations has rejected a Russia-backed proposal for a treaty on cybercrime, despite widespread agreement that closer international co-operation is vital in a world more closely connected by global computer networks.

  18. Trusteer detects rapid spread of new polymorphic Zeus trojan

    Trusteer says it has detected a completely new version of the Zeus password stealing trojan that has been designed to steal online banking credentials.

  19. Hackers stole Google password program

    The hackers responsible for the Operation Aurora attack against Google also managed to compromise its single sign-on password system, according to a report in the New York Times this week. The attack, which happened in December, targeted a highly secretive system operated by the search engine giant called Gaia last December.

  20. Extortion trojan targets torrent site users

    Anti-malware company Avira has reported an extortion scam designed to scare torrent site users into giving their credit card information to a phishing site.

What’s hot on Infosecurity Magazine?