The Jericho Forum has taken the wraps off a set of best practice identity principles – enshrined in a set of commandments – which seek to lay down the ground rules for IT security professionals when dealing with the complex world of digital identities.
Facebook flaws leaks millions of data elements to third parties claims researcher
The reputation of the apparent cybercriminal’s playground that is Facebook took another battering this week after a Symantec researcher revealed that as many as 100,000 Facebook applications are leaking data to third parties.
Organizations not equipped to prevent DDoS attacks, DNS failures
Many organizations are not equipped to prevent and respond to web infrastructure failures caused by distributed denial of service (DDoS) attacks and Domain Name System (DNS) failures, according to research commissioned by VeriSign.
WebGL opens browser to attacks that can disable computer
A researcher at the Context Information Security consulting firm has identified a number of serious vulnerabilities in the new WebGL 3D graphics standard enabled by default in Firefox 4 and Google Chrome browsers, and as an option in the Apple Safari b…
FERC wants more power to protect electric grid from cyber attacks
The Federal Energy Regulatory Commission (FERC) is looking to expand its authority to protect the electrical grid against cyber attacks.
Sony Ericsson posts info on hacking Xperia Android phones
In a move that has caused raised eyebrows in the smartphone industry, Sony Ericsson has posted detailed information on how to hack its Xperia range of Android smartphones.
TalkTalk introduces first ISP-level malicious URL filtering service
TalkTalk, a third-party telco and broadband supplier, has launched the UK’s first ISP-level broadband security service.
Context discovers security flaws in WebGL technology
Context Information Security claims to have discovered a range of security flaws in WebGL technology, a web-based extension to the JavaScript programming language that allows 3D graphic images to appear with users’ web browsers.
Curiosity kills the cat as hackers use new infection techniques
Hackers appear to be using social networking and news trending topics, judging from a recent analysis from Luis Corrons, technical director with Panda Security, who notes that the death of Osama bin Laden and the Royal Wedding have been used as lures i…
LastPass hits the master password change button after alert
LastPass, the popular online password management service, has started the lengthy process of forcing members to undergo master password changes following anomalies on its inter-server data logging systems.