BT conducted a survey of over 2000 IT users and decision makers across 11 countries. The research, released during last week’s Infosecurity Europe show in London, showed that Western European organizations tend to take a more guarded approach to BYOD i…
Columbia posts faculty social security numbers on the internet
Columbia University has notified 3,000 faculty members that their names, addresses, social security numbers, and bank account numbers were available on the internet for two years.
42 blackmail sites -posing as news sites – shut down in China
Genuine news sites publish information on events – these sites, say the Chinese authorities, promised not to publish information for a fee.
Want someone else’s Hotmail account?
A software bug can often lead to a vulnerability that can be exploited with sophisticated exploit code. Or sometimes you can just instal a free add-on that lets you do the same thing with no effort.
SOCA and the FBI takedown 36 AVC websites
In a joint exercise between between multiple law enforcement agencies, 36 websites associated with an e-commerce platform known as an automated vending cart (AVC) used to sell stolen credit cards were taken down on Wednesday.
Hacker could take over traffic and railroad control systems using backdoor
A researcher has uncovered a backdoor in RuggedCom software used to control traffic and railroad systems that could enable a remote attacker to take control of the systems.
Hacker posts VMware source code on internet
A hacker has posted source code for VMware’s ESX virtual machine on the internet, the company has confirmed.
Infosecurity Europe 2012: The ICO on better regulation and better infosec
Christopher Graham, the UK Information Commissioner, talks about his role as an information regulator and facilitator at Infosecurity Europe in London
One in five Macs harbors malware, Sophos finds
A disturbing one in five Mac computers are infected by some form of malware, according to research by IT security firm Sophos.
Infosecurity Europe 2012: defining risk management in the context of information security
The three companies represented on the keynote panel (G4S Secure Solutions, Steria UK, and Skipton Building Society) are very different; and their CISOs have very different views on the functioning of risk management within infosec.