Yesterday the Directorate General for External Policies at the European Parliament held a workshop on the The Anti-Counterfeiting Trade Agreement (ACTA).
Compromised websites leading to banking malware
M86 Security is warning that recent spam campaigns are luring victims to compromised websites that redirect to malicious Phoenix-hosting sites, which in turn seek to infect the visitor with the Cridex trojan.
The ten most important security events and issues from 2011, and what they presage for the future
Kaspersky Lab’s analysis of the ‘evolution of malware’ during 2011, from the rise of hacktivism to the emergence of Mac malware; and the consequent lessons for the future.
RSA 2012: Hacking, external actors dominate 2011 data breaches
A full 86% of the data breach cases investigated by Verizon Business in 2011 originated from hacking, and 92% were carried out by an external agent rather than an insider or partner, according to select findings from its 2012 Data Breach Investigations…
Bodog takedown: maybe SOPA and PIPA and ACTA and DEA just aren’t necessary
Civil liberties groups are happy that SOPA has, at least temporarily, gone away; and that ACTA seems to be running into problems in some European countries. But given recent LEA takedowns, are these new laws even necessary?
RSA 2012: Anonymous shakes up complacent corporate management
Anonymous has had at least one beneficial effect: top management at companies are starting to pay attention to information security, judged Grady Summers, vice president at MANDIANT, who participated in a Wednesday panel discussion on hacktivism at the…
RSA 2012: Are software liability laws needed?
Software liability laws are needed to hold software companies accountable for making faulty products, argued Bruce Schneier, chief technology security officer with BT during a pro-con debate held Wednesday at the RSA Conference.
RSA 2012: Schneier on why Anonymous is not a group and why they’re certainly not as good as you think they are
At the RSA Conference 2012 in San Francisco, February 29, Bruce Schneier and Davi Ottenheimer discuss Schneier’s latest book and how to enable the trust that society needs to thrive.
RSA 2012: BYOD often means ‘bring your own danger’
Three-quarters of IT professionals believe that personally owned mobile devices put their organizations at risk and only 39% have the necessary security controls to address the risk posed by the bring-your-own-device (BYOD) phenomenon, according to a W…
Risky business: IT professionals use risky methods for access control
A majority of information security professionals are employing risky methods to control access to enterprise servers, according to a survey by Fox Technologies and Echelon One.