The US Army has activated its first cyber brigade to provide a proactive cyber defense, the service announced last week.
Missing authentication token leads to security breach for a quarter of firms
Close to a quarter of UK organizations have suffered a security breach as a result of identity fraud linked to a lost or stolen authentication device, according to an Entrust survey.
GCHQ’s cryptanalysis code challenge cracked
The deadline on the apparent GCHQ code challenge, due to expire last night, has been extended by 24 hours.
Google+ rolls out facial recognition feature for photos
Google+ has begun rolling out its “Find My Face” facial recognition feature for photos on the social networking site.
Azerbaijan or bust: 30% growth expected in infosec market
The information security market in the Central Asian nation of Azerbaijan is expected to grow 30% in 2012, according to US-based endpoint management and security firm Lumension.
Trade secrets top list of IP stolen by malicious insiders
Trade secrets are the most common intellectual property (IP) type stolen by malicious insiders, according to a new report by Symantec.
The holidays are a time for festivities and phishing
The holidays are a time for parties, presents, decorations, shopping, and – phishing! Here are some tips to avoid phishing scams.
Hacker cracks RIM’s PlayBook security fix on Day One
A hacker who developed the Dingleberry tool to jailbreak the BlackBerry PlayBook tablet has issued a new version of the tool to circumvent a patch Research in Motion (RIM) issued this week to prevent it from working.
Proactive Detection of Network Security Incidents: a new report from ENISA
The European Network and Information Security Agency (ENISA) has released a new report designed to help improve the proactive detection of security incidents. It is the result of questioning a wide range of leading CERTs combined with ENISA’s own exper…
Free mobile apps are not ‘free’ of malware, warns IEEE experts
Institute of Electrical and Electronics Engineers’ (IEEE) experts have uncovered malware in more than 2,000 free smartphone applications. Free rogue applications are expected to be the most common access point for mobile hackers over the next year.