It looks as though the FBI is quietly canning its long-standing Carnivore methodology of scanning internet users’ sessions, and, where it is difficult to isolate a users’ actual IP session, simply replicating and recording the entire IP data pipe.
Security researcher warns over Google Doodle scareware infection
A German security researcher has warned on a new hacker methodology of infecting users by presenting poisoned web search results as a primary hit after they click on a Google Doodle.
Facebook security measures do not go far enough, say security experts
Security experts have warned that Facebook’s latest security innovations against spam e-mail and online fraud may have mixed results in effectiveness and user experience.
US Attorney General Eric Holder dashes hope of UK trial for hacker Gary McKinnon
US authorities are still insisting that self-confessed UK hacker, Gary McKinnon, face a US court, despite ongoing efforts to have the trial in the UK.
Indian security agencies gear up for wide-ranging Web 2.0 surveillance
Whilst UK and US security agencies keep their IT/communications surveillance systems and plans under carefully guarded wraps, the Indian government has taken the approach of being quite open. According to a report in the Economic Times, the Indian Cent…
Anonymous splinter group blamed for attack on Eidos International site
It seems that the loose organisation of the Anonymous hacktivist group is causing problems, as reports are coming in that the web portal of Eidos International, a major gaming firm, was hacked and defaced on Wednesday night (US time) of this week.
VA has failed to fix information security gaps for over a decade, says GAO
For more than a decade, the Department of Veterans Affairs (VA) has failed to fix information security problems identified by the Government Accountability Office (GAO), as well as the VA’s Office of the Inspector General, the VA’s independent auditor,…
Jericho Forum professional explains challenges ahead in digital security
James Whyte, head of IT service delivery with F&C Investments, and a member of the Jericho Forum, says that there is now a clear need for an effective – and secure – digital ecosystem in cyberspace.
Zeus source code: from $100K to free in a matter of months
Reports are coming in that the source code for Zeus, a long-running trojan that has been modified many times since the summer of 2007, is now available on several underground forums.
Facebook flaws leaked data to third parties, claims researcher
The reputation of the apparent cybercriminal’s playground that is Facebook took another battering this week after a Symantec researcher revealed that as many as 100,000 Facebook applications are leaking data to third parties.