Security Leadership — News

Federal agency issues new security rules for financial institutions

The federal agency that regulates banks today issued new rules for online <a href="http://www.networkworld.com/topics/security.html">security</a> for financial institutions, instructing them to use minimal types of "layered security" and fraud monitoring to better protect against <a href="http://www.networkworld.com/columnists/2011/062311-andreas.html">cybercrime</a>.

Ellen Messmer | 29 Jun | Read more

Tumblr hit with huge phishing attack

Tumblr is dealing with an aggressive phishing campaign. Only recently launched, it aims to steal log-in credentials and employs many of the well-known <a href="http://www.csoonline.com/article/480589/9-dirty-tricks-social-engineers-favorite-pick-up-lines">social engineering tactics</a> that scammers use on social media sites such as <a href="http://www.csoonline.com/article/497076/5-facebook-twitter-scams-to-avoid">Facebook and Twitter</a>.

Joan Goodchild | 29 Jun | Read more

Hackers Gone Mild: 6 Rebels Turned Insiders

Sony hacker George Hotz a.k.a Geohot is reportedly <a href="http://www.pcworld.com/article/231202/sony_hacker_said_to_land_facebook_job.html">working at Facebook</a> after spending several years agitating technology giants. The news follows Hotz's antics this year when Sony sued him for distributing digital keys and a set of tools that would let you run <a href="http://www.pcworld.com/businesscenter/article/216541/sony_asks_for_restraining_order_over_ps3_hack.html">illegally copied games</a> on the PlayStation 3. Before his Sony showdown, Hotz was also one of the first people to jailbreak Apple's iPhone with a hardware unlock, although software tools that could do the same job soon replaced this method.

Ian Paul | 29 Jun | Read more

Symantec finds big differences in iOS, Android security

<a href="http://www.networkworld.com/slideshows/2009/060309-apple-quiz.html">Apple</a> iOS and Google <a href="http://www.networkworld.com/news/2010/110910-google-android-useful-resources-smartphones.html">Android</a> have some big differences when it comes to mobile <a href="http://www.networkworld.com/topics/security.html">security</a>, creating distinct potential vulnerabilities for enterprises embracing devices running these operating systems, according to analysis by Symantec.

John Cox | 29 Jun | Read more

LulzSec, Anonymous Hacks Were Avoidable, Report Says

The <a href="http://www.pcworld.com/article/231215/lulzsec_a_short_history_of_hacking.html">hacker group LulzSec</a> made headlines recently with its smash and grab data breaches against Sony, the U.S. Senate, Arizona's Department of Public Security and PBS. But it turns out that attacks like these are often avoidable, according to a new report sponsored by the Department of Homeland Security.

Ian Paul | 29 Jun | Read more

Symantec compares iOS and Android security

Apple's iOS and Google's Android smartphone platforms are more secure than traditional desktop-based operating systems, but are still susceptible to many existing categories of attacks, according to<a href="http://www.symantec.com/about/news/release/article.jsp?prid=20110627_02&amp;om_ext_cid=biz_socmed_twitter_facebook_marketwire_linkedin_2011Jun_worldwide_mobilesecuritywp">a 23-page report from security software vendor Symantec.</a>

Mikael Ricknäs | 28 Jun | Read more

LulzSec's parting Trojan is a false positive

The LulzSec hacking group <a href="http://lulzsecurity.com/releases/50%20Days%20of%20Lulz.txt">sailed off into the sunset Saturday,</a> leaving behind a treasure trove of stolen data along with what some antivirus programs identified as a nasty surprise for anyone who downloaded the Torrent file: <a href="https://www.infosecisland.com/blogview/14784-Warning-Original-50-Days-of-Lulz-Payload-is-Infected.html">a Trojan horse program.</a>

Robert McMillan | 28 Jun | Read more

DDoS attacks bolster cloud website optimiser

Enterprise product in the making and ‘loved’ by disbanded hacker group LulzSec. The constant and very real threat of distributed denial of service (DDoS) attacks aimed at headline grabbing “hacker” groups, such as Lulz Security and Anonymous, have helped one tech start-up pick up new business.

Liam Tung | 28 Jun | Read more

5 free ways to use crowdsourcing for investigations

We have all heard the phrase, "When all else fails, try, try again." But in an investigation, when your own skills aren't enough, your professional network can't support you, and your leads go cold, what is next? You need to try again, yes, but try a new approach. One new approach is to turn to the 'wisdom of crowds' for answers.

Brandon Gregg | 28 Jun | Read more

U.S. Government Regularly Asks Google for Users' Data

Not only does the U.S. government regularly request users' private data from Google, it does so more often than any other government, the search engine reported Monday. Google announced these details as part of its <a href="http://www.google.com/transparencyreport">Transparency Report</a>, a bi-annual disclosure of what governments worldwide are asking for.

Ed Oswald | 28 Jun | Read more

You Can Bring Your Kids to DefCon!...?

Are your kids interested in hacking? Well, now you can bring them to <a href="https://www.defcon.org/index.html">DefCon</a>, the annual convention for hackers, security researchers, and undercover FBI agents trying to figure out what the hackers are up to.

Kevin Lee | 28 Jun | Read more

Lulzsec: A Short History of Hacking

Over the weekend, the hyperactive group of hackers who call themselves Lulzsec announced they are <a href="http://www.pcworld.com/article/231201/lulzsec_says_goodbye_with_new_data_dump.html?tk=rel_news">breaking up the band</a>, while also claiming that their "50-day cruise" had been planned all along.

Eric Mack | 28 Jun | Read more