For the first time, NTT has pooled the resources of its group companies and produced a threat report based on an analysis of 3 billion attacks. What it found is that while attackers move faster than defenders, and there are still many basic processes a…
NHS Care.data PR Fiasco Continues as Google Pulls Out of Secret Deal
First the NHS was forced to delay its care.data project (storage of all patient GP health data in a central data warehouse) for six months; then it was learned that PA Consulting had obtained 27 DVDs of hospital event statistics (HES) and uploaded them…
Snoopy: A Non-NSA Flying Stingray
Stingray is a US law enforcement spoof cell tower used to track the location of mobile phones. Snoopy is a project conducted by London-based Sensepost Research Labs that does similar and much more with any WIFI-enabled device. Now Snoopy has gone airbo…
Apple Mac Ebay Scam Gang Busted
EC3, the cyber branch of Europol, has dismantled a Polish gang involved in online auction fraud. The gang would offer electronic items such as Apple computers, but deliver anything from a brick to items of fruit and vegetables. The scam involved Ebay a…
Turkish Twitter Ban: An Exercise in Futility?
Following a nationwide ban on Twitter last week, thousands of internet denizens have been working successfully to get around the moratorium. Now, Turkey has taken steps to thwart circumvention efforts that will result in IP address filtering – but it c…
Time Warner Fielded Fewer than 250 National Security Information Requests in 2013
In the wake of Edward Snowden’s revelations and allegations that top ISPs and tech companies were complicit in the mass surveillance of the American people by the NSA, there has been an avalanche of transparency reports detailing law enforcement reques…
Middle East Malware Rates Five Times Worldwide Average
At the RSA conference 2014 in San Francisco, Tim Rains, director of Trustworthy Computing at Microsoft, spoke to Infosecurity editor Eleanor Dallaway about the security threat landscape in the Middle East.
Zorenium Bot: Heading to an iPhone Near You?
A new bot with the name Zorenium has landed in the criminal underground, with the ability to target Apple iOS devices like iPhone and iPad. It’s not widely known, nor is it widely detectable.
California’s DMV Investigates Card Processing Breach
When Brian Krebs learned of a private MasterCard warning being circulated to banks, he challenged the DMV – and only then did it issue a public statement that it was indeed investigating a potential security issue.
ISACA Launches Digital Badges for Credential Verification
ISACA is taking steps against fraudulent security credentialing with the introduction of digital badges for individuals who have completed one of the group’s training processes.