Infosecurity News

  1. Apple iPhone jailbreaking is 'okay under EU law'

    Jailbreaking Apple iPhones to bypass code aimed at limiting the applications and carriers owners can use is unlikely to violate EU copyright laws.

  2. Black Hat 2010: Qualys releases BlindElephant application analysis security tool

    Qualys has taken the wraps off BlindElephant, an application security utility that analyses web applications running on company systems and is billed as allowing security professionals and systems administrators to identify everything running on their servers, including any web applications users may have downloaded.

  3. Facebook 'hack' releases 100 million user details onto filesharing sites

    A privacy storm is brewing following the collation and publication on filesharing services of the details of around 100 million Facebook users by a security researcher.

  4. Black Hat 2010: Microsoft and Adobe collaborate to share vulnerability information

    At Black Hat Las Vegas, 28th July 2010, Microsoft announced that it will extend its Microsoft Active Protections Program (MAPP) to include vulnerability information sharing from Adobe Systems.

  5. Suspected Mariposa botnet author arrested

    A 23-year-old Slovenian man – thought to be the author and creator of the infamous Mariposa (butterfly) botnet – has been arrested by Slovenian police, working in concert with their colleagues from Spain and a team from the FBI.

  6. Suspected Mariposa botnet author arrested

    A 23-year-old Slovenian man – thought to be the author and creator of the infamous Mariposa (butterfly) botnet – has been arrested by Slovenian police, working in concert with their colleagues from Spain and a team from the FBI.

  7. Commerce Secretary looks to improve cybersecurity in commercial sector

    Speaking at a cybersecurity symposium in Washington yesterday, US Commerce Secretary Gary Locke called on commercial, academic and public sector interests to submit their ideas on mitigating cyber threats in the commercial sphere, without stifling innovation in the internet economy.

  8. Cybercriminals tap online automated services to check fraud effectiveness

    The increasing automation of online frauds has been extended into the field of fraud effectiveness checks, as virus authors and botmasters are said to be using automated tools to verify the effectiveness of their fraudulent activities.

  9. Cybercriminals tap online automated services to check the effectiveness of their frauds

    The increasing automation of online frauds has been extended into the field of fraud effectiveness checks, as virus authors and botmasters are said to be using automated tools to verify the effectiveness of their fraudulent activities.

  10. 88% of UK IT managers concerned over customer online security fears

    Research just released claims to show that IT staff are spending their resources on security to ease customer concerns and establish better levels of online trust.

  11. UK launches Cyber Security Challenge

    The UK has officially launched its Cyber Security Challenge to find and attract new talent to the IT security industry.

  12. ISACA says no to mandatory real-time reporting of data breaches – suggests financial accounting approach

    ISACA, the not-for-profit IT security association, has given a qualified 'thumbs up' to suggestions that UK companies should be required to report their all of their data breaches and losses, but it is recommending that reports should be included in company financials, which are issued on a quarterly and annual basis.

  13. ICO toughens up on Freedom of Information Act compliance

    The Information Commissioner's Office (ICO) is to get tougher with public authorities that are slow or unco-operative in responding to Freedom of Information Act requests.

  14. PC demand pushes Microsoft to record sales

    Microsoft produced record fourth quarter sales of $16.04bn, 22% up on the same quarter 2009, as demand for PCs running its new operating system, Windows 7, improved worldwide.

  15. PC demand pushes Microsoft to record sales

    Microsoft produced record fourth quarter sales of $16.04bn (£10.47bn), 22% up on the same quarter 2009, as demand for PCs running its new operating system, Windows 7, improved worldwide.

  16. Panda Security CIO calls latest Windows zero-day flaw 'scary' – suggests Microsoft workaround is essential

    The July 16 admission by Microsoft about its latest zero-day flaw in which the software giant explained that a vulnerability exists because Windows incorrectly parses shortcuts so that malware can be executed when a shortcut icon is displayed – and not clicked through – has been described as scary by Panda Security's CIO Luis Corrons.

  17. EASA Software develops governance solution to spreadsheet-driven disasters

    According to EASA Software, the humble spreadsheet is responsible for more bad business decisions than humans, with spreadsheets regularly wiping between 15% to 20% from a company's share value, due to the fact that copying spreadsheets – or parts of them – can result in mathematical errors that few spot, let alone question.

  18. IBM discusses its security strategy

    It has been a busy acquisition season in the security sector thus far, with few companies being more active in this sphere than IBM. Members of the IBM security team spoke with Infosecurity about their views on the future of security and the firm’s strategy going forward.

  19. South Shore Hospital data breach may affect up to 800,000; contractor named

    Earlier this week, Massachusetts-based South Shore Hospital informed patients, employees, and others affiliated with the institution that personal information may have been exposed when it contracted a data management firm to dispose of outdated files. Now comes news that the company South Shore used was Archive Data Solutions, according to publicly filed records from the Department of Health and Human Services.

  20. Windows zero-day flaw places SCADA systems in peril

    Research carried out by Sophos claims to show that the zero-day flaw identified by a number of security vendors late last week is being exploited by a new variant of the Stuxnet malware.

What’s hot on Infosecurity Magazine?