Yesterday, reporting an interview with Foreign Secretary William Hague, the Telegraph stated that the UK, “should be willing to engage in covert cyber attacks on enemy states.” The Netherlands is simultaneously proposing to allow its police to take the…
Sony data breach lawsuit largely dismissed
A class-action suit against Sony over a PlayStation Network data breach in April of 2011 has been largely dismissed, after months of consumer backlash and high-profile recriminations against the company.
US considers preemptive action to prevent ‘Cyber Pearl Harbor’
Iran may have been the culprit behind the recent rash of cyber-attacks on oil and gas giants in the Middle East, said US Defense Secretary Leon Panetta, who recently warned that the US was facing the possibility of a “cyber-Pearl Harbor” as politically…
ISSE 2012: Securing the OS and User Experience is Key to Securing Smartphones, Says BlackBerry
Smartphones should be shipped with microkernel technology from the beginning and a sandbox for every application, Patrick Michaelis, senior product manager, BlackBerry Security, told the audience at ISSE 2012 in Brussels, 23rd October. “The technology …
Microsoft settles with Sabelnikov over the Kelihos botnet
A short note on Andrey Sabelnikov’s Facebook page says simply, “Endless story is ended at last.” Sabelnikov is the Russian coder accused by Microsoft of being the man behind the Kelihos botnet. Sabelnikov denied this – and now the two sides have reache…
Piers Morgan’s denial of phone hacking at The Mirror to be tested in court
Just weeks before the Leveson Inquiry is expected to deliver a critical report on press ethics to prime minister David Cameron, a new lawsuit over alleged phone hacking is filed; this time against Trinity Mirror Group, including the time when Piers Mor…
Japan & India strengthen cyber-security cooperation
During a meeting to exchange views on regional and international security, including maritime, cyber and outer-space security, India and Japan have agreed to kick off the India-Japan Cyber Security Dialogue, starting with an early meeting in the coming…
Cross-zone scripting vulnerabilities found in Dropbox and Drive
“Exploiting this vulnerability,” announced IBM’s Application Security Insider blog, “an attacker could steal arbitrary files from a DropBox / Google Drive user by tricking him into viewing a malicious HTML file inside the mobile app.”
Passwords: young people are lax, rich people are careful
A new survey on password attitudes shows a difference between age groups, income, marital status and more – providing intriguing data that might be as valuable to the sociologist as to the security industry.
Pacemaker virus could lead to “mass murder”
Hackers now have a new attack vector, but one with much more serious consequences than data theft or financial ruin: pacemakers and implantable cardioverter-defibrillators (ICDs).