We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

20 hot IT security issues you need to know about

Malicious android apps to how security stories affect behaviour

From malware on Google's Android phones to the US Defense Advanced Research Projects Agency trying to understand how stories or narratives impact security and human behaviour, the security world certainly is never boring. Here we take a look at 20 security stories that have shaped the industry in the past few months.

Anonymous forces HBGary Federal CEO to step down

The hactivist group Anonymous has won for now its skirmish with the CEO of HBGary Federal, the network security firm whose emails were stolen and posted on the internet, leaving the company red-faced over the content as well as the ease with which its network was hacked. CEO Aaron Barr told Threatpost that he's stepping down in order to help the company regain its reputation and to start improving his own. His promise to expose the names of Anonymous members recently drew an attack that yielded more than 50,000 HBGary Federal emails that the group posted on the internet. The group also detailed publicly how it exploited weak passwords and unpatched servers to crack the network, then used information on passwords it gleaned to break into the company's Gmail accounts.

US indicts 27 in Apple product credit-card fraud ring

New York prosecutors indicted 27 people in February as part of a crime ring that bought Apple iPods, iPads and other products with stolen credit card information for resale in the criminal underground. In raids conducted on February 1, agents seized $300,000 in cash, three firearms and ammunition as well as equipment to make fake credit cards from the gang, which split into two operations running from June 2008 through the end of last year.

Cloud services could bolster national cybersecurity

The shift to cloud computing offers an opportunity to better secure the national digital infrastructure by concentrating the burden of cybersecurity among a relatively small number of service providers rather than thousands of individual businesses, according to a report by a foreign policy think tank. "Cloud computing has weaknesses, but it also offers the opportunity to aggregate and automate cyber defence," according to a new report by the Center for Strategic and International Studies.

Will electronic toll systems become terrorist targets?

Weaknesses in 802.11p vehicular wireless networks could make them targets for terrorists seeking to wreak havoc on motorways, according to a presentation at the recent Black Hat DC conference. The technology will someday be used for controlling traffic flow and warning drivers of highway dangers - a system that could be exploited if not implemented properly, says Rob Havelt, director of penetration testing at security vendor Trustwave's SpiderLabs.

NEXT PAGE: Low-cost SSL proxy

  1. Malicious Android apps
  2. New cyberattack plans
  3. Cryptographic security for iPhones and Android
  4. Anonymous forces CEO of HBGary to step down
  5. Low-cost SSL proxy

IDG UK Sites

Best camera phone of 2015: iPhone 6 Plus vs LG G4 vs Galaxy S6 vs One M9 vs Nexus 6

IDG UK Sites

In defence of BlackBerrys

IDG UK Sites

Why we should reserve judgement on Apple ditching Helvetica in OS X/iOS for the Apple Watch's San...

IDG UK Sites

Retina 3.3GHz iMac 27in preview: Apple cuts £400 of price of Retina iMac with new model