Infosecurity News

Successful bank phishing attacks target compromised infrastructure
Nearly all of the successful phishing attacks against US banks exploit compromised infrastructure, according to data compiled by email security firm Agari.
Trust in communications is decreasing
While the UK is becoming increasingly better connected, trust in those connections is declining.
THOR: a new P2P botnet for sale
A new botnet is nearing completion and is being offered for sale on the hacking underground at $8000.
India/Bangladesh cyberwar moves to a new level
The ongoing cyberwar between India and Bangladesh has escalated with Teamgreyhat, in support of “our Indian brothers”, moving from commercial to economic targets.
Cyber churn at DHS: And Schaffer makes six
Greg Schaffer is leaving his post as head of the US Department of Homeland Security’s Office of Cybersecurity and Communications, marking the sixth high-ranking cyber official to leave the agency since June 2011.
Twitter complies with court order – hands over account details
Guido Fawkes in the UK is the pseudonym of an award-winning anti-establishment blog operated by Paul Staines. In the US it is a name associated with a Twitter account handed over to law enforcement. Around the world is has become associated with the Anonymous movement.

Cable modem hacker convicted of defrauding cable firms out of $1 million
Ryan Harris, known as the cable modem hacker, was convicted on seven counts of wire fraud by a federal court in Boston for helping users steal internet access that cost cable companies $1 million in lost revenues.
RSA 2012: Top G-Man says Anonymous, not Al-Qaeda, will be top security threat
Cybersecurity threats will overtake terrorism as the top US national security concern, FBI Director Robert Mueller told the RSA Conference on Thursday.
Infosec professionals unsure about abilities to stop cyber attacks
Three-fourths of information security professionals lack confidence in their ability to address cybersecurity threats, according to a survey by LogRhythm.
“ACTA’s harm greatly exceeds its potential benefits...”
Yesterday the Directorate General for External Policies at the European Parliament held a workshop on the The Anti-Counterfeiting Trade Agreement (ACTA).
Compromised websites leading to banking malware
M86 Security is warning that recent spam campaigns are luring victims to compromised websites that redirect to malicious Phoenix-hosting sites, which in turn seek to infect the visitor with the Cridex trojan.
The ten most important security events and issues from 2011, and what they presage for the future
Kaspersky Lab’s analysis of the ‘evolution of malware’ during 2011, from the rise of hacktivism to the emergence of Mac malware; and the consequent lessons for the future.
RSA 2012: Hacking, external actors dominate 2011 data breaches
A full 86% of the data breach cases investigated by Verizon Business in 2011 originated from hacking, and 92% were carried out by an external agent rather than an insider or partner, according to select findings from its 2012 Data Breach Investigations Report (DBIR) released at the RSA Conference.
Bodog takedown: maybe SOPA and PIPA and ACTA and DEA just aren’t necessary
Civil liberties groups are happy that SOPA has, at least temporarily, gone away; and that ACTA seems to be running into problems in some European countries. But given recent LEA takedowns, are these new laws even necessary?
RSA 2012: Anonymous shakes up complacent corporate management
Anonymous has had at least one beneficial effect: top management at companies are starting to pay attention to information security, judged Grady Summers, vice president at MANDIANT, who participated in a Wednesday panel discussion on hacktivism at the RSA Conference.
RSA 2012: Are software liability laws needed?
Software liability laws are needed to hold software companies accountable for making faulty products, argued Bruce Schneier, chief technology security officer with BT during a pro-con debate held Wednesday at the RSA Conference.
RSA 2012: Schneier on why Anonymous is not a group and why they’re certainly not as good as you think they are
At the RSA Conference 2012 in San Francisco, February 29, Bruce Schneier and Davi Ottenheimer discuss Schneier’s latest book and how to enable the trust that society needs to thrive.
RSA 2012: BYOD often means ‘bring your own danger’
Three-quarters of IT professionals believe that personally owned mobile devices put their organizations at risk and only 39% have the necessary security controls to address the risk posed by the bring-your-own-device (BYOD) phenomenon, according to a Websense-sponsored survey by the Ponemon Institute released Wednesday at RSA.
Risky business: IT professionals use risky methods for access control
A majority of information security professionals are employing risky methods to control access to enterprise servers, according to a survey by Fox Technologies and Echelon One.
XSS vulnerabilities discovered almost on demand
The last week has seen multiple XSS vulnerabilities found almost anywhere and everywhere on the internet, lending early weight to predictions for 2012.



