Tag Archives: Infosec News

Infosec Weekly Round-up May 28 – June 3, 2012

The Flame: Questions and Answers “Duqu and Stuxnet raised the stakes in the cyber battles being fought in the Middle East – but now we’ve found what might be the most sophisticated cyber weapon yet unleashed. The ‘Flame’ cyber espionage

Infosec Weekly Round-up May 14 – 20 , 2012

Attack Surface: Healthcare and Public Health Sector US Department of Homeland Security Issues Warning on Medical Device Threats. “This Bulletin highlights how the portability and remote connectivity of MDs introduce additional risk into Medical IT networks and failure to implement

Infosec Weekly Round-up May 07 – 13 , 2012

CERT Warns On Critical Hole In SCADA Software By Italian Firm Progea “The U.S. Department of Homeland Security issued a bulletin on Thursday warning readers about a previously undisclosed, critical vulnerability in Movicon 11, a product used to manage critical

Infosec Weekly Roundup April 30 – May 6, 2012

Cross-platform malware exploits Java to attack PCs and Macs “The same Java vulnerability used in the infamous Flashback malware is now being used as an attack vector for a single piece of malware that can infect both Windows and Mac

Infosec Weekly Round-up April 23 – 29 , 2012

Nissan security team detected a malware attack against their facilities “We have detected an intrusion into our company’s global information systems network. On April 13, 2012, our information security team confirmed the presence of a computer virus on our network

Infosec Weekly Roundup, April 9 – 15 , 2012

How do I stop wireless hackers? “The security systems used on home wireless systems can be hacked but it’s not an easy matter and requires a fair amount of technical expertise and determination. Provided you are using the highest level

Infosec Weekly Roundup, April 2 – 8 , 2012

SQL Injection through HTTP Headers The first up for this week is a brilliant post by Yasser Aboukir about a new way for SQL Injection through HTTP Headers. “During vulnerability assessment or penetration testing, identifying the input vectors of the