While a Sony representative was telling a House panel that its networks were secure, hacker group LulzSecurity was releasing a file containing personal information on over one million Sony customers.
MI6 attacks al Qaeda magazine; infects site with cupcake recipes
UK spy agency MI6 is reported to have hacked one of the Jihadist publications that supports al Qaeda’s cause, replacing bomb making recipes with ingredient and cooking instructions for that most dastardly of culinary weapons: cupcakes.
Latest Google attack highlights problems ahead for cloud operators, say experts
This week’s attack – allegedly from China – against users of Google’s email account servers has highlighted the dangers ahead for cloud service operators, according to Node4, a hosted IT systems specialist.
Fake iPhone sold for £95.00 in Staffordshire
A fake iPhone was sold for £95.00 to a worker standing outside a restaurant in Stoke-on-Trent. Unfortunately for the purchaser, Yasir Hussain, by the time he realised it was a fake, the man and his van that sold him the mobile had driven off.
58% of UK office workers losing track of files on computers
Research just published suggests that many of us are struggling to keep track of files on our office PCs, with 58% admitting to have struggled to find important files or documents they thought had been saved on their work computer.
Researcher claims Rustock botnet author looked for Google job
Security researcher Brian Krebs has made the interesting assertion that the suspected Rustock botnet creator has been looking for a job with Google.
Can ‘digital ants’ protect computer networks?
Apparently inspired by how ants protect their colony when it is threatened, a team of computer experts is testing software that they claim could offer foolproof protection against virus attacks.
Credit card darkware shops selling card details on turnkey basis
According to researchers with RSA, card fraudsters are now selling credit and debit card credentials – and allied information – on a turnkey basis.
Security at the dawn of a new age in computing
A new age of “anytime” and “anywhere” computing, combined with “any device” has brought with it new challenges for enterprise security. Join Infosecurity for our Virtual Conference session on “Security in the Age of *Any* Computing” to explore this tim…
Were RSA hackers behind Lockheed Martin breach?
RSA hackers might have been behind the recent information security incident at defense contractor Lockheed Martin, according to security experts.