Safari, the world’s fourth most popular browser, contains a universal cross-site scripting bug that could be exploited to steal cookies, passwords or files, perform cross-site request forgeries (CSRF) or install viruses via malicious Javascript.
Iceland, Wikileaks and The Pirate Bay
Tiny Iceland has a history of facing down larger adversaries (in 1976 it ‘won’ the Cod Wars against the UK; in 2011 it sent US agents packing for not obeying protocol). But now it will face renewed scrutiny from two of the world’s most powerful agencie…
Kali Linux Accessibility Improvements
A couple of weeks ago, we were approached (independently) by two blind security enthusiasts who both drew our attention to the fact that Kali Linux had no built-in accessibility features. This made Kali difficult, if not impossible, to both install and…
Privileged account compromise behind 100% of recent large-scale APT attacks
Privileged accounts with insufficient security is a prime vector for targeted cyber-attacks, leading to theft, misuse and exploitation, and their compromise is becoming a key tactic in each phase of an advanced persistent threat (APT) attack cycle.
Infosecurity Europe 2013: Infosec can no longer hinder business objectives
CISOs need to change their approach if they are to make their voice heard
Verizon: Financial malware, state-sponsored hacking dominated 2012 data breaches
Large-scale financial cybercrime and state-affiliated espionage dominated the security landscape in 2012, taking top (dis)honors for being behind the most breaches during the year.
Infosecurity Europe 2013: Analysts scan the threat horizon
Hacktivism and espionage are poised for growth, but cyberthreats will continue to follow the money.
Infosecurity Europe 2013: Small firms in cybercriminals’ sights
More small firms are the victims of cyber attacks, and the cost of breaches is rising across the board, according to a PwC-BIS survey.
IPS needs to become more aware of advanced evasion techniques
Advanced evasion techniques (AETs) rarely receive the full publicity they deserve – possibly because it is a term originally coined by one manufacturer (Stonesoft) to describe how attackers defeat other security manufacturers.
Infosecurity Europe 2013: Minister puts infosecurity at heart of UK growth strategy
Chloe Smith, Minister for Political and Constitutional Reform, opens Infosecurity Europe 2013