Security researchers have identified a new version of the Storm worm that plagued the internet three years ago. The new version uses HTTP for command-and-control purposes instead of the original peer-to-peer approach, say reports.
FBI names new cybercrime director
The FBI has promoted Gordon M. Snow as assistant director of its Cyber Division, saying that the bureau’s highest priority in the criminal sphere is combating cybercrime.
Israel lifts Apple iPad ban
Israel has lifted a ban on imports of Apple’s iPad, which was imposed because authorities said the device’s Wi-Fi system was incompatible with Israel’s wireless standard.
Kaspersky Lab host infosec student event in Poland
Kaspersky Lab has announced it will be hosting an IT security student conference in Krakow, Poland, on May 23/24. The event – titled ‘IT Security for the Next Generation’ – forms part of the Kaspersky academy education programme.
Blippy suffers credit card number leak
Shoppers’ social networking service Blippy suffered a security flaw late last week, after some of its users’ credit card numbers began appearing in search results.
Microsoft wins piracy battle in China
Microsoft has won its first big piracy battle in China against a Shanghai-based insurer.
McAfee blames QA process change for faulty update
Companies around the world have been forced to clean up thousands of computers after the flawed McAfee anti-virus update released on Wednesday caused chaos.
Flash-based client device identification on the way out
Gartner has warned that the use of Flash local storage as a means of verifying end-user devices for security purposes is coming to an end.
Lancashire Constabulary taps into secure virtual desktop technology
Lancashire Constabulary has implemented a secure virtual desktop environment to manage staff access to its restricted and confidential networks.
Researchers develop GPS-free phone tracking hack
Security researchers have discovered a way to track a mobile phone user’s whereabouts without using a GPS signal, it was revealed this week. It is even possible to listen in on telephone voicemails, according to the information, divulged in a presentat…