It appears that hackers are taking advantage of the interest in Netflix – the California-based IP streaming firm that offers services on specific smartphones in North and South America – by releasing a general Android edition of the software that runs …
Infosecurity writers take home more hardware
Continuing our own brand of a ‘commitment to excellence’, Infosecurity writers took home two awards at this year’s BT Information Security Journalism Awards in London.
Security researcher claims ID theft now more profitable than car theft
A leading IT security researcher claims that hackers are now electronically breaking into US car dealerships – not to steal cars, but the IDs and other credentials of car purchasers, most of whom buy on finance.
ATM industry association issues anti-reverse engineering recommendations
The ATM industry association – the ATMIA – has published a best practice manual on cash machine security. And a new feature of its recommendations is for developers to help prevent reverse engineering of cash machine software.
Ministry of Defence drops another Adobe PDF blunder; reveals radar defense secrets
The UK’s Ministry of Defence has once again demonstrated its lack of understanding of how Adobe PDF format files function as, according the Daily Star tabloid newspaper, anyone with a simple knowledge of page formatting can ‘unblack’ apparently censore…
Low-cost kit for sale on eBay could hand national infrastructure secrets to terrorists
Reports that air traffic control data has been found on network kits sold on eBay comes as no surprise, says Philip Lieberman, president of Lieberman Software.
Chaos Computer Club warns on “German government” communications trojan
Rumors of a series of German government-developed spyware trojans have been bouncing around for several years, but now the Chaos Computer Club (CCC) claims to spotted one in the wild.
Context discovers reverse web proxy security loophole; advises on remediation
Context Information Security has warned of a back door threat to the Apache platform that could allow unauthorized access to internal or DMZ systems.
ISACA publishes COBIT process assessment model
Now into its 15th year, the COBIT 5 framework is in the final stages of ratification by ISACA and, as part of this evolution of the GRC (governance, risk and compliance) framework, the association has issued a new process assessment model.
Stanford Hospital faces $20 million lawsuit over patient data breach
A class-action lawsuit for $20 million has been filed against Stanford Hospital & Clinics over a patient data breach in which personal information on 20,000 emergency room patients was posted on a public website for a year.