Anecdotal evidence suggests that the typical price of mid-to-high-end smartphones has taken a tumble on internet auction sites such as eBay over the last week or so, suggesting that looters from the London riots are disposing of their stolen goods online.
New malware generates reverse text in file names
A security researcher has warned of a new type of malware that reverses and hides the ‘exe’ in the name of a file, making an exe file appear, for example, as a text or doc (document) file.
Researcher discovers distributed bitcoin cracking trojan malware
A Symantec security researcher is reporting the discovery of a trojan that infects and adds users’ computers to a processing swarm designed to brute force decrypt the bitcoin electronic currency system, generating as much as $150.00 per infected comput…
SANS Institute’s NetWar challenge takes on the US military
The SANS Institute has expanded its NetWars challenge, which tests information security skills of IT professionals, to include the US military, noted Ed Skoudis, director of the SANS NetWars project.
Infosec expert traces and recovers his laptop – stolen in the London riots – using Google Street View WiFi data
A technical expert with HP-ArcSight says he was able to track and report his Macbook Pro laptop – stolen in last week’s London riots – and assist the police in returning the computer.
Security researcher warns on smartphone juice-jacking risk
A leading security researcher has warned smartphone users of the risk they run by charging their handset at one of the growing USB-linked ‘power stations’ that are popping up at airports, shopping malls and other locations across the US, Canada and Eur…
UK IT profession could suffer as postgraduate course fees face huge rises
The UK IT profession could suffer as a result of the soaring cost of postgraduate courses on the back of rises in the fees for undergraduate studies.
Thales develops on-SIM mobile wallet authentication and encryption technology
Thales has developed what it claims is the industry’s first cryptographic technology capable of running in the memory of a cellular phone’s SIM card, meaning that the secure m-wallet function can operate wholly on the SIM card, interacting with secure …
Imperva says hackers are tapping Google’s powerful search engine features once again
Data security specialist claims that cybercriminals are tapping the powerful search features that Google offers, generating more than 80,000 daily queries. This, the firm says, allows the hackers to conduct a significant amount of cyber reconnaissance …
Source code for SpyEye trojan leaked onto forums and filesharing services
It seems that the source code for SpyEye – the sister malware to Zeus – has been released on a number of file-sharing sites, as well loaded onto the file areas of a number of darkware forums. The move follows the `sharing’ of the source code of Zeus ea…