Rather than consulting a crystal ball, the Information Security Forum (ISF) looked to experts in the field – including those from its member organizations – to develop a set of security risk predictions for 2012 and beyond.
Apple iPhone jailbreaking is ‘okay under EU law’
Jailbreaking Apple iPhones to bypass code aimed at limiting the applications and carriers owners can use is unlikely to violate EU copyright laws.
Black Hat 2010: Qualys releases BlindElephant application analysis security tool
Qualys has taken the wraps off BlindElephant, an application security utility that analyses web applications running on company systems and is billed as allowing security professionals and systems administrators to identify everything running on their …
Facebook ‘hack’ releases 100 million user details onto filesharing sites
A privacy storm is brewing following the collation and publication on filesharing services of the details of around 100 million Facebook users by a security researcher.
Black Hat 2010: Microsoft and Adobe collaborate to share vulnerability information
At Black Hat Las Vegas, 28th July 2010, Microsoft announced that it will extend its Microsoft Active Protections Program (MAPP) to include vulnerability information sharing from Adobe Systems.
Suspected Mariposa botnet author arrested
A 23-year-old Slovenian man – thought to be the author and creator of the infamous Mariposa (butterfly) botnet – has been arrested by Slovenian police, working in concert with their colleagues from Spain and a team from the FBI.
Suspected Mariposa botnet author arrested
A 23-year-old Slovenian man – thought to be the author and creator of the infamous Mariposa (butterfly) botnet – has been arrested by Slovenian police, working in concert with their colleagues from Spain and a team from the FBI.
Commerce Secretary looks to improve cybersecurity in commercial sector
Speaking at a cybersecurity symposium in Washington yesterday, US Commerce Secretary Gary Locke called on commercial, academic and public sector interests to submit their ideas on mitigating cyber threats in the commercial sphere, without stifling inno…
Cybercriminals tap online automated services to check fraud effectiveness
The increasing automation of online frauds has been extended into the field of fraud effectiveness checks, as virus authors and botmasters are said to be using automated tools to verify the effectiveness of their fraudulent activities.
Cybercriminals tap online automated services to check the effectiveness of their frauds
The increasing automation of online frauds has been extended into the field of fraud effectiveness checks, as virus authors and botmasters are said to be using automated tools to verify the effectiveness of their fraudulent activities.