Organizations are wasting money beefing up security at the perimeter when they should be focusing on securing access within the network, said Adam Bosnian, executive vice president Americas and corporate development at Cyber-Ark Software
Enterprises ignore cybercrime trends at their peril, says security researcher
Cybercriminals know the value of data better than the organizations they are targeting, according to a security strategist who studies hacker behavior.
Enterprises ignore cybercrime trends at their peril, says security researcher
Cybercriminals know the value of data better than the organisations they are targeting, according to a security strategist who studies hacker behaviour.
McAfee, Siemens team to combat critical infrastructure threats
Information security firm McAfee and industrial giant Siemens are teaming to improve security against malware, such as Stuxnet, that targets industrial control systems running critical infrastructure protection.
Interview: William Barker, chief cyber security advisor, NIST, Dept. Of Commerce
The inaugural World Cyber Security Technology Research Summit was held at Queen’s Centre for Secure Information Technologies (CSIT) in Belfast in March. Of all the delegates that Infosecurity had the pleasure of speaking with, William Barker, chief cyb…
Android/iPhone app allows spoofed caller ID calls to be made
A new app for Google Android and jailbroken iPhones allows users to make calls with their own choice of caller ID. Known as SpoofPro, the app routes calls via the company’s servers in the US, allowing any caller ID to be generated.
Feds take down Coreflood botnet
The Department of Justice (DoJ) and the FBI announced this week the shutdown of the Coreflood botnet that infected more than 2 million computers worldwide with keylogging malware designed to steal financial information from victims.
Cyber-Assisted Physical Attacks are Here and Now says John Bumgarner, US Cyber Consequences Unit
At the World Cyber Research Summit in Belfast on March 16th, Infosecurity’s Eleanor Dallaway had the opportunity to interview John Bumgarner of the US Cyber Consequences Unit.
Report recommends removing admin rights from end users
Research just released claims that in order to increase security on an organisation’s network, managers should remove admin level rights for end users.
Libyan rebels successfully hack the country’s eastern cellular network from the inside
A group of “expatriate executives and engineers” have quietly wrested control of Libyan’s cellular network in the rebel-held areas of the country, allowing officials with the transitional government in the East to communicate wirelessly with each other…