“Big data analytics can improve information security and increase cyber resilience” claims a new report from the Information Security Forum (ISF).
ENISA calls for joint effort between users and providers to secure online identities
ENISA notes that nearly 18.5 million user passwords have been stolen in just seven major hacks this year already, and has published guidelines on how both users and service providers can better secure them in the future.
New Morto worm variant emerges with file infection capability
A new variant of the Morto worm has added a file infection capability to the malware’s arsenal of weapons, warned a Microsoft researcher.
Korean hackers arrested for stealing data on 8.7 million mobile subscribers
South Korea’s National Police Agency (NPA) has arrested two hackers for stealing and selling personal information on 8.7 million KT mobile subscribers.
Black Hat 2012: Webroot Researcher Says Delayed Breach Disclosure is Advisable
At Black Hat in Las Vegas, July 27 2012, Grayson Milbourne – director of threat research at Webroot – told Infosecurity that sometimes it is best if a breach goes undisclosed until the company concerned has answers and a recovery plan.
All your speech belongs to Apple
Apple’s new Mountain Lion operating system is now available – but with it comes a surprising new twist to the terms and conditions for the new dictation capability. Apple gets and keeps the dictated files.
Rakshasa: Hindu demon – and permanent, undetectable backdoor
A security researcher has developed proof of concept for a PC backdoor that is both undetectable and very difficult to remove – and capable of infecting more than 100 different motherboards.
Apple to buy AuthenTec for $356 million
In a deal unanimously agreed by the AuthenTec board, but not yet by its shareholders, Apple Inc is to buy the mobile security firm at a price valuing shares at $8.00 – a 58% premium on the earlier closing price.
Black Hat 2012: Pappas bounces his way to $200,000 Microsoft BlueHat prize
Vasilis Pappas has won Microsoft’s $200,000 BlueHat defensive computer technology research prize for his kBouncer, an efficient and fully transparent return-oriented programming (ROP) mitigation technique.
Black Hat 2012: FAA’s new air traffic control system vulnerable to cyber attack
The US Federal Aviation Administration’s (FAA) new air traffic control system could be vulnerable to cyber attack, warned researcher Andrei Costin at the Black Hat conference this week in Las Vegas.