Anonymous hits US government contractor, law enforcement institutions
It has been a busy few days for hacktivist group Anonymous. On Friday they released some 400 MB of documents seemingly belonging to US government contractor Mantech, …
Conversation-spying Android Trojan in the wild
Android malware has so far been spotted doing things like sending text messages or making calls to premium service numbers, sending out information about the device and …
Arrested “Topiary” has a name, faces five charges
The alleged LulzSec member arrested last week by the e-Crime Unit of London’s Metropolitan Police on the Shetland Islands has a name: Jake Davis. He is 18 years old …
Facebook introduces bug bounty program
Facebook has decided to follow in Google’s and Mozilla’s steps and institute a bug bounty program rewarding the responsible disclosure of security vulnerabilities …
Week in review: Massive iFrame injection attack, Anonymous/LulzSec arrests and Facebook phishing
Here’s an overview of some of last week’s most interesting news and articles: Global analysis of 10 million web attacks Web applications, on average, experience …
Conficker found on external HD devices on sale
Australian supermarket chain ALDI might seem like the last place where one can pick up a Conficker infection, but according to an emergency security alert by the Australian …
“Wrong hotel transaction” spam bombards victims with malware
A particularly malicious spam run consisting of emails ostensibly sent by reception desk managers of various hotels has been targeting Visa users. The emails exhibit subject …
Web app security scanner Netsparker 2.0 released
Netsparker can crawl, attack and identify vulnerabilities in all custom web applications regardless of the platform and the technology it’s built on, just like an actual …
Norman antimalware appliance built on Linux platform
Norman announced the latest version of its Network Protection (NNP) antimalware appliance, which improves protection against persistent IT infrastructure security attacks. New …
IT control objectives for cloud computing
Cloud computing has become a major growth area in IT spending, and enterprises must adapt to the changes it brings to maximize the return on investment. To help organizations …
BT commanded to block site linking to pirated content
The verdict is in: British Telecom must block users from accessing the Newzbin 2 website, an aggregator of links to pirated movies and other content. The ruling could provide …
Use Google’s indexing capabilities to identify vulnerabilities
Next week at Black Hat, Stach & Liu researchers Francis Brown and Rob Ragan will show how the power of Google’s indexing capabilities can be harnessed to identify …