This is a guest post by Vincent Ammirato.Your personal computer has a lot more junk in it, than what is visible to the eye. To ensure this junk does not hinder the performance of your PC you must do away with it on an on-going basis. This will not…
Bachmann aide accuses candidate, senior staff of data theft
A campaign aide to former Republican presidential candidate Michele Bachmann is suing Bachmann and her senior campaign staff for allegedly stealing her private email list to promote the candidate among Christian home-school advocates in Iowa.
Better late than never: Wells Fargo appoints first CISO
In an announcement that boggles the infosec-savvy mind, global financial firm Wells Fargo has only just appointed its first chief information security officer (CISO).
Big Data Analytics should be used for security as well as commercial purposes
“Big data analytics can improve information security and increase cyber resilience” claims a new report from the Information Security Forum (ISF).
ENISA calls for joint effort between users and providers to secure online identities
ENISA notes that nearly 18.5 million user passwords have been stolen in just seven major hacks this year already, and has published guidelines on how both users and service providers can better secure them in the future.
New Morto worm variant emerges with file infection capability
A new variant of the Morto worm has added a file infection capability to the malware’s arsenal of weapons, warned a Microsoft researcher.
Korean hackers arrested for stealing data on 8.7 million mobile subscribers
South Korea’s National Police Agency (NPA) has arrested two hackers for stealing and selling personal information on 8.7 million KT mobile subscribers.
Black Hat 2012: Webroot Researcher Says Delayed Breach Disclosure is Advisable
At Black Hat in Las Vegas, July 27 2012, Grayson Milbourne – director of threat research at Webroot – told Infosecurity that sometimes it is best if a breach goes undisclosed until the company concerned has answers and a recovery plan.
All your speech belongs to Apple
Apple’s new Mountain Lion operating system is now available – but with it comes a surprising new twist to the terms and conditions for the new dictation capability. Apple gets and keeps the dictated files.
Rakshasa: Hindu demon – and permanent, undetectable backdoor
A security researcher has developed proof of concept for a PC backdoor that is both undetectable and very difficult to remove – and capable of infecting more than 100 different motherboards.