Infosecurity News
Ministry of Defence: another day, another data loss
Detailed figures just released by the Ministry of Defence show that the military arm of the government had a total of 347 data loss incidents in 2009, with 71 further losses of confidential information in January plus February of this year alone.
Granular firewall environment needed for Facebook and Twitter
One of the least-reported areas of IT security in recent times is the topic of firewalls but, according to Gabi Reish, head of network security with Check Point, the technology is now into its fifth generation, largely as a result of the rise of the internet.
Attackers use PAC feature to redirect browsers
Brazilian malware writers are making use of a long-available feature within most modern browsers to launch attacks that redirect victims to malicious websites without their knowledge. The feature, known as proxy auto config, is turning up in banking trojans, according to researchers from Kaspersky.
Game consoles at work threaten corporate security
Games console in the workplace pose an increasingly serious threat to enterprise security, according to new research from Sunbelt Software. The anti-malware vendor said that almost 4 in 10 respondents to the survey had no idea about any of the documented threats relating to online console gaming.
Feds lagging on FDCC, watchdog says
Federal agencies are lagging behind in the implementation of the Federal Desktop Core Configuration (FDCC) requirements, according to the US Government Accountability Office.
Network Solutions fixes WordPress installations
Web hosting company Network Solutions has deployed a massive fix for a configuration flaw that led to hundreds of WordPress blogs being compromised.
IT job growth stagnates during March
Numbers from IT advocacy group TechServe Alliance show that IT job growth declined month-over-month in March, putting a halt to the uptick the industry has experienced since December of last year.
Weekly Brief, April 13, 2010
Infosecurity reviews the week's security news
EXIF mining tool released
EviGator has released TAG Examiner, a tool for examining large quantities of image files to recover metadata.
New York resident sentenced in Charles Schwab hacking scam
A Manhattan resident was sentenced last week for his part in an international money laundering and data theft scheme that hacked into accounts at brokerage firm Charles Schwab.
File sharing law firm bows out of mass copyright legal actions
The Consumer's Association has launched a publicity campaign against the law firms generating large numbers of copyright actions against alleged internet filesharers, and it appears to have paid off.
Windows mobile game offers free trojan
A new Windows Mobile game - apparently being offered free of charge - has a nasty surprise hidden inside; a trojan that makes very expensive international phone calls.
Alternate data stream tool launched
RootKitAnalytics has made a tool available for discovering hidden alternate data streams. Called StreamArmor, it is designed to analyze a feature of the Windows file system that allows hidden data to be embedded in files.
ISACA survey reveals uncertainty over cloud computing security risks
Nearly half of US IT professionals surveyed by ISACA said they believe that the security risks of cloud computing outweigh the potential benefits.
Protegrity predicts rising IT security sales on back of enhanced ICO penalties for data breaches
Protegrity, the Stamford, Connecticut-based enterprise data security specialist, is quietly making its presence felt in the UK and Europe, largely thanks to a growing network of resellers handling the firm's products.
The White Lotus DDoS botnet analysed
Research just released from Arbor Networks makes the interesting assertion that a new family of distributed denial of service (DDoS) botnets has arrived on the hacker scene.
70 arrested in Romania in cybercrime ring
Seventy people were arrested in Romania this week as part of an investigation of three organised criminal groups connected with cybercrime.
Kaspersky patents code-tracing technology
Kaspersky has successfully patented technology that enables analysts to trace the activity of software code without infringing upon intellectual property.
Gracenote, Civolution in UGC fingerprinting deal
Content watermarking firm Civolution has signed an expanded long-term agreement with online music database firm Gracenote to jointly market an audio and video content identification platform that lets content owners and service providers filter and monitor content.
Riverbed and McAfee in optimization deal
McAfee has signed a deal with IT performance optimisation company Riverbed Technology to embed its firewall technology in the Riverbed Steelhead WAN optimisation appliance.