The website of the DarkComet remote administration tool (RAT), which was used to spy on opposition groups by the Syrian regime, has closed down permanently.
Evolve or perish: Chinese professor develops evolutionary cryptography
A professor in China has developed a new cryptosystem, called evolutionary cryptography, that draws on evolution theory in biology to construct more secure encryption.
Venture capital group pumps $22.4 million into SIEM provider AlienVault
AlienVault, a San Mateo, Calif.-based security information and event management (SIEM) provider, has received $22.4 million in funding from a venture capital group led by Kleiner Perkins Caufield & Byers (KPCB) and Sigma.
High tech car thief jailed
The high tech theft of motor vehicles is likely to rise as their computer content increases. In an early case, Alan Watkins was last week jailed for car theft that involved hacking, GPS tracking and motor car identity theft.
Printer Bomb infects through .htaccess redirection web attack
Symantec researchers have determined that the Milicenso trojan (also known as the Printer Bomb) is downloaded by an .htaccess redirection web attack that has infected at least 4,000 websites.
Most security professionals predict breaches will increase this year
A disturbing 93% of IT security professionals believe that data breaches will increase this year, according to nCircle’s 2012 Information Security and Compliance Trend study.
Assume everyone is infected, EU agency advises banks
The EU’s cybersecurity agency is recommending that banks should assume that all customers’ PCs are infected and institute security measures based on that assumption.
How to get a Google Reward – go public
A loophole in Google Apps was remarkably simple, found by Indian blogger Saket Jajodia, and reported to and rapidly closed by Google. But getting recognition for the discovery was less easy.
Fog Computing; or catching the insider the DARPA way
The insider threat is generally acknowledged to be a serious threat to data security. For companies it can lead to the loss of IP; for governments, the loss of state secrets. Fog Computing is a new approach to detecting and preventing that threat.
Android Malware Samples Predicted at 250,000 for 2012
Trend Micro has provided details on the Android threat: the volume of malware; the types of malware; specific families and what they do.