A new trojan called Ares has been identified as a potential successor to the notorious Zeus trojan that has been employed to steal credentials used in millions of pounds in theft.
Security researcher Moxie Marlinspike placed on federal watch list
Leading IT security researcher Moxie Marlinspike has reportedly been placed on a US federal watch list, possibly as a result of being friends with Jacob Appelbaum, the high-profile WikiLeaks volunteer and security researcher, who was detained on an int…
Sophos unveils top 20 Mac malware list
Software security firm Sophos has released a list of the 20 most commonly detected types of malware for Mac users. Topping the list is Mal/ASFDldr-A, malware that comes in the form of malicious media files.
DHS sponsors state and local government cybersecurity center
The Department of Homeland Security (DHS) is launching a cybersecurity center for state and local governments that will cooperate with DHS’s National Cybersecurity and Communications Integration Center (NCCIC).
Webroot says online shopping security habits getting worse
You might think that, with IT security awareness rising amongst members of the public, that the general level of security whilst shopping online might also be rising. But according to research just published, this doesn’t appear to be the case.
Security researcher Moxie Marlinspike placed on US federal watch list
Leading IT security researcher Moxie Marlinspike has reportedly been placed on a US federal watch list, possibly as a result of being friends with Jacob Appelbaum, the high-profile WikiLeaks volunteer and security researcher, who was detained on an int…
US Air Force warns of ‘devastating’ effects of location-aware services
The US Air Force has warned troops that using location-aware applications on social networking sites could have “devastating” consequences for military operations.
Privileged account security examined in next Thursday’s webinar
The role of privileged account security is the subject of Infosecurity’s upcoming webinar, which takes place next Thursday afternoon. Speakers lined up for the event include Bob Tarzey, an analyst and director with Quocirca, as well as Richard Walters,…
DRM technology now needed for data archiving security
Digital Rights Management (DRM) technology is not only being used to protect organisation’s intellectual property rights, but is now also needed in the data archiving industry, says a DRM expert.
SHA-1 crypto protocol cracked using Amazon cloud computing resources
A German hacker has successfully cracked a six-character implementation of the 160-bit SHA-1 crypto algorithm using a cloud computing resource. The hack was completed in 49 minutes at a cost of just $2.10.