Two researchers have demonstrated that lessons have not been learned from Robin Sage, a fictitious character created on social media in 2009, who went on to collect friends in the FBI and CIA and get job offers from Google and Lockheed Martin.
Amount of Mobile ‘Madware’ Spikes in Google Play
Mobile malware focused at Google’s Android operating system is proliferating at a prodigious rate. But increasingly, a particularly unsavory brand of malicious adware – dubbed “madware” – has been making significant inroads to Google Play. Volume-wise,…
(ISC)² Recognizes Excellence in Government Cybersecurity
(ISC)² has announced the recipients of its annual US Government Information Security Leadership Awards (GISLA) program, including the inaugural Lynn F. McNulty Tribute GISLA award, which went to Dr. Ronald “Ron” Ross, senior fellow at the National Inst…
Contactless Payment Details Can Be Intercepted with Inexpensive Equipment
A paper published this week by the Institution of Engineering and Technology (IET) demonstrates that contactless payment card data can be intercepted at more than four times the distance laid down by standards.
Finnish Government Network Hacked
Finnish foreign minister Erkki Tuomioja yesterday confirmed reports that the country’s government networks had been breached by hackers. Local TV station MTV3 had earlier claimed that Chinese or Russian agents may have been involved.
RSA Europe 2013: SMB Websites More Toxic than Pornographic Sites says Symantec
Legitimate SMB websites pose a greater cybersecurity threat than pornography sites, says Sian John, security strategist at Symantec.
Apple iOS Apps Found to Have a Common Hijacking Vulnerability
A flaw impacting Apple iOS-based apps has been discovered that, if exploited, could allow an attacker to hijack the server URL from which mobile applications load their data, replacing the served data with his own content.
Attackers Ramp Up Threats to the Energy Sector
The US energy sector experienced the largest number of malware attacks of any industry in the spring and summer of 2012, with the end result being expensive outages at pipelines, oil refineries and drilling platforms. This year, brute-force attacks and…
Building Security In Maturity Model: Version 5 Released
BSIMM-V is effectively a scorecard that can be used by companies to either measure or improve their existing software development security stance. It is not a ‘standard’ in the regulatory sense; it more a practical description of actual best practices.
RSA Europe 2013: The Lessons BT Learnt from Securing London 2012
The lessons learnt from securing the digital infrastructure at the London 2012 Games have given BT a better understanding of how to do cyber defence, said Mark Hughes, CEO of BT Security in his keynote at RSA Europe today