Par:AnoIA (Potentially Alarming Research from the Anonymous Intelligence Agency) has released 14 GB of data that it claims was lifted from the Bank of America.
Android spambot, blended threats top mobile spam threats in 2013
Mobile users are increasingly likely to be spammed. New research has revealed there were more than 350,000 unique unsolicited mobile spam variants in 2012, with the highest churn rate in December with more than 53,000 unique variants alone.
RSA 2013: CSA provides legal resources for cloud computing; issues list of top threats
The Cloud Security Alliance has announced several initiatives at this week’s RSA Conference in San Francisco that range from privacy issues, legal information, and major threats relevant to the cloud security landscape.
New emergency bug fixes for Adobe Flash
Adobe has released a new emergency out-of-band patch for Flash – the third Flash update this month and the fourth this year – fixing two vulnerabilities currently being exploited against Firefox, and a third vulnerability that could potentially be expl…
RSA 2013: The grey area of active defense – live manipulation of Kelihos
A live demonstration of active defense at RSA this week highlights the current debate on just how active (for which read ‘offensive’) companies can be in defending their networks. Laws to prevent hacking may also protect the hackers.
RSA 2013: Interview with security evangelist Stephen Cobb
Infosecurity Editor, Eleanor Dallaway, spent a fascinating 45 minutes picking the brain of ESET security evangelist, Stephen Cobb at RSA in San Francisco.
RSA 2013: Compliance Equals False Sense of Security, Says Vormetric
Compliance is responsible for a false sense of security, Alan Kessler, President & CEO, Vormetric, told Infosecurity at the RSA Conference in San Francisco, February 26 2013.
RSA 2013: Aadhaar, the Indian Electronic Identity Scheme, will change lives, says RSA keynote presenter
During the keynote sessions at the RSA conference in San Francisco today, Srikanth Nadhamuni, Head of Technology at UID Authority of India and CEO at Khosla Labs, presented Aadhaar, the identity scheme in India.
Technology moves to make cloud synchronization / storage secure
One of the most worrying security concerns to come out of the growth of cloud computing and BYOD has been the extensive adoption of third-party file synchronization services, typified by Dropbox and Box, but also including other cloud services such as …
Big data analytics for anomaly detection in security
Big data analytics first evolved for use in marketing: by understanding the relationships between customers and actions, better marketing can be developed. Now the practice is being applied to security: by understanding the relationship between network…