The anonymity of cybercafe users in India is being severely curtailed, in a bid to stamp out illegal, fraudulent and terrorist usage of this popular method of gaining internet access.
Aussie bank customers hit by advanced phishing techniques
Customers of the Commonwealth Bank in Australia are being targeted by a new breed of phishers, who seem intent on scamming them out of their e-banking and payment card details.
Unencrypted laptop with 109 000 records on pension schemes members stolen
An unencrypted laptop containing details on 109 000 pension schemes members with UK pension funds service provider, The Pensions Trust, has been stolen from a third-party office in Marlow, Buckinghamshire.
Guide to handling personal data launched by BCS and ISAF
The British Computer Society (BCS) has linked up with the Information Security Awareness Forum (ISAF) to launch a professional code of best practice when handling personal data.
ENISA evaluates network resilience of MPLS, IPv6 and DNSSEC
The European Network and Information Security Agency (ENISA) has released two reports on how and if Multi Protocol Label Switching (MPLS), Internet Protocol version 6 (IPv6) and Domain Name System Security Extensions (DNSSEC) could improve the resilien…
Twitter worm steals user details
A worm on Twitter is tricking users into giving up their user details at the same time as redirecting victims to a dating website where the aggregate number of views result in affiliate revenue.
Google indexes details on thousands of credit and debit cardholders
Police in Victoria, Australia are investigating a potentially major security incident in which the stolen personal details of thousands of credit and debit card holders from Australia, Germany and the UK were posted to a blogging site and auto-indexed …
RAF data loss included sensitive vetting data
The Ministry of Defence (MoD) has omitted information that the theft of hard drives in September 2008 with data on RAF personnel also included highly sensitive RAF vetting records.
Open Group advises on risk management methods
Independent consortium the Open Group is trying to resolve what it sees as confusion about risk management in the industry by publishing a guide to choosing a risk management methodology.
Jericho Forum links with Cloud Security Alliance
Hard on the heels of unveiling Cloud Cube, its four-dimensional best practice model for cloud computing security in April, security industry association the Jericho Forum has linked with the Cloud Security Alliance (CSA), a not-for-profit vendor group.