In response to theDepartment of Justice (DoJ) and Microsoft, Google said that the General Services Administration (GSA) had determined that Google Apps for Government was certified under the Federal Information Security Management Act (FISMA), a claim …
Whitehall black-on-black text security blunder reveals info on multiple websites
An elementary security error involving the use of black text on a black background with redacted security documents published on the web effectively made the IT prowess of the Ministry of Defence, and other government departments, a laughing stock over…
Linkedin social engineering test snares 68% of users
Trusteer, the in-browser security specialist, recently conducted a honeypot social engineering test on 100 users of LinkedIn, with 68% of users potentially infecting themselves.
Network access control, not perimeter security, should be priority, says Cyber-Ark exec
Organizations are wasting money beefing up security at the perimeter when they should be focusing on securing access within the network, said Adam Bosnian, executive vice president Americas and corporate development at Cyber-Ark Software
Network access control, not perimeter security, should be priority, says Cyber-Ark exec
Organizations are wasting money beefing up security at the perimeter when they should be focusing on securing access within the network, said Adam Bosnian, executive vice president Americas and corporate development at Cyber-Ark Software
Enterprises ignore cybercrime trends at their peril, says security researcher
Cybercriminals know the value of data better than the organizations they are targeting, according to a security strategist who studies hacker behavior.
Enterprises ignore cybercrime trends at their peril, says security researcher
Cybercriminals know the value of data better than the organisations they are targeting, according to a security strategist who studies hacker behaviour.
McAfee, Siemens team to combat critical infrastructure threats
Information security firm McAfee and industrial giant Siemens are teaming to improve security against malware, such as Stuxnet, that targets industrial control systems running critical infrastructure protection.
Interview: William Barker, chief cyber security advisor, NIST, Dept. Of Commerce
The inaugural World Cyber Security Technology Research Summit was held at Queen’s Centre for Secure Information Technologies (CSIT) in Belfast in March. Of all the delegates that Infosecurity had the pleasure of speaking with, William Barker, chief cyb…
Android/iPhone app allows spoofed caller ID calls to be made
A new app for Google Android and jailbroken iPhones allows users to make calls with their own choice of caller ID. Known as SpoofPro, the app routes calls via the company’s servers in the US, allowing any caller ID to be generated.