Infosecurity News

  1. Hold software providers accountable for IT failures

    Regulation could protect businesses and governments from poor IT implementations that have cost billions of dollars. But at present, software is generally shipped with a disclaimer which states that the manufacturer does not guarantee it will work, unlike regulated industries such as pharmaceuticals where the supplier is held accountable for a failure in manufacturing.

  2. Competition will drive down NHS IT costs, say Conservatives

    The Conservative party is to reveal plans to cut NHS IT spending by scrapping the government's planned central database for medical records.

  3. Fibre optic networks not secure without encryption

    Fibre optic networks are not secure enough to transmit information that has not been encrypted, according to a recent report from IDC Research.

  4. UK national ID card cloned in 12 minutes

    The prospective national ID card was broken and cloned in 12 minutes, the Daily Mail revealed this morning.

  5. Managed wireless security set to hit $1 billion by 2014

    A study just released by ABI Research predicts a period of healthy growth for managed wireless security solutions, with growth averaging 27% a year for the period 2008 to 2014.

  6. Does weak cloud password security mean local storage is best?

    Hard on the heels of researchers at last week's Black Hat security briefings showing how easy it is to recover third party passwords on Amazon's EC2 and Microsoft's Office Online services, Andy Cordial, Origin Storage's managing director, said that this highlights the fact that local storage technology is far more secure than the cloud.

  7. WatchGuard acquires BorderWare in private transaction

    Seattle-based WatchGuard Technologies - the unified threat management (USM) security vendor - has announced plans to buy privately-held BorderWare Technology, which employs around 90 staff, for an undisclosed sum.

  8. Companies invest in IT, but do not measure IT value

    Despite 30% of IT security companies increasing their investments in IT this year, fewer than half have a shared understanding of IT value across the enterprise and two-thirds fail to fully measure it, according to ISACA.

  9. SquirrelMail open source email project hacked

    It now seems that the hacking of the servers of the SquirrelMail open-source email project in late June may have been worse than originally reported.

  10. Zeus botnet traced to Latvian operation

    Researchers have been busy over the last few days tracing where the Zeus botnet is being controlled from, following investigations by the University of Alabama in the US, which tracked down the Zeus Bot virus to a raft of fake internet postcards circulating on the internet.

  11. Arbor Networks shows how Iran filters and blocks internet traffic

    Arbor Networks has published internet bandwidth usage figures from June and July that make fascinating reading if you ever wondered how less democratic governments such as Iran filters and blocks internet traffic for their citizens.

  12. US credit reporting system flawed claims information security researcher

    Clever hackers are exploiting a number of loopholes in US credit reporting systems to substantially improve their credit rating and so gain access to zero percent loans and low-cost credit cards, an information security researcher said over the weekend.

  13. ISF details top ten future IT security threats

    Cybercrime is at the top of the Information Security Forum's (ISF) Threat Horizon list for 2011, which highlights the growth of `crimeware as a service' offered by criminal gangs, along with infiltration into organisations to carry out insider attacks.

  14. Black Hat: San Francisco meters hacked for free parking

    At the Black Hat security conference in Las Vegas, researchers have revealed how the security of San Francisco's plans to become a showcase for the US on computerised parking has been compromised.

  15. Black Hat: Department of Defense call for three cyber-czars

    This morning, 30 July, at the Black Hat conference in Las Vegas, Robert Lentz, Senior Information Assurance Official for the Department of Defense, declared the need for two extra cyber-czar roles: one for identity, and one for information security training and education.

  16. Black Hat: Information security trade press are bound to Google

    At the BlackHat conference in Las Vegas, 29 July 2009, one conference session addressed the changing nature of the information security trade press. A panel of experienced journalists answered questions on the relationship between trade and mainstream media, the rise of Google news, and the financial challenges affecting the publishing industry.

  17. MX Logic reports spams levels hitting highest levels ever

    Research just released by MX Logic suggests that spam as a percentage of overall email has reached its highest point ever, currently accounting for 94.6% of all email.

  18. Adobe confirms Flash contains Microsoft security flaw

    Should vendors include programme code from third parties, is the question experts are asking, now that Adobe has acknowledged that it used Microsoft's allegedly flawed development code in its products.

  19. The correct approach on access assurance revealed

    Access assurance may be a complex area, but Stuart Hodkinson, UK general manager with Courion Corporation - along with Fran Howarth, a principal analyst with Quocirca - had more than a few answers in an educational and informative webinar this week.

  20. Latest MessageLabs intelligence report: spammers getting cleverer

    The July 2009 MessageLabs Intelligence Report concludes that spammers have turned to using online translation services to develop multilanguage spam runs.

What’s hot on Infosecurity Magazine?