Atlassian password breach due to forgotten database   London, 13th April 2010 - The recent database breach that exposed passwords that hit software development tool maker Atlassian was, due, in their words to an old database table that “was not taken offline or deleted, and it is this database table that we believe could have been exposed during the breach.”   Amichai Shulman, Imperva’s CTO explains, “This is an example of a database that was forgotten and left unprotected—something that happens more frequently that most would prefer to admit. In this case, the database contained sensitive information, but once it wasn’t used as a production system it was forgotten. Unmanaged systems put sensitive data residing on them at a high risk - unmanaged systems are the top targeted systems.”  

Read more: Atlassian password breach due to forgotten database

Trusteer Warns of Impending Wave of PDF malware attacks   LONDON, 12th April, 2010 A structural flaw in the Adobe PDF format - which is widely used to distribute documents across multiple computing platforms - can be exploited to install almost any malware on a user's computer.   And says Trusteer, the browser security and fraud prevention specialist, security researcher Didier Stevens' demonstration (http://bit.ly/bDVf7W) of a multi-stage misuse of Adobe `/Launch' function - which is part of the PDF feature set - poses a potentially serious threat to organisations and individuals.   The demonstrated attack allows criminals to embed a malicious executable file inside a simple PDF file. When the user opens the PDF the malicious executable runs.    "Whilst Acrobat Reader normally display a warning that an executable inside a PDF file is being launched, Stevens appears to have found a way to modify the alert and fool users into approving the action," said Mickey Boodaei, Trusteer's CEO.

Read more: Trusteer Warns of Impending Wave of PDF malware attacks

EDINBURGH, UK – 9TH APRIL 2010. EAST (the European ATM Security Team) has reported a 36% drop in ATM related fraud losses in 2009, with total losses of 312 million Euros reported (down from 485 million Euros in 2008). Annual losses due to card skimming have fallen for the first time since EAST began reporting in 2004 (down from 484 million Euros in 2008 to 310 million Euros in 2009).

International losses due to skimming attacks fell by 43% from 393 million Euros to 226 million Euros, continuing a downward trend for each six monthly reporting period first noticed at the end of 2007. This is further indication that the EMV* rollout at ATMs in Europe (now 94% complete) is helping to reduce skimming losses, and also that fraud counter-measures, fraud monitoring capabilities and fraud detection continue to improve. Losses continue to be reported globally, and the risk of counterfeit EMV cards being used to withdraw cash fraudulently from ATMs in parts of the world that are not EMV compliant remains.

Read more: European ATM fraud losses down 36% reports EAST - European ATM Security Team

Keylogger sophistication rising as criminals look for new sources of card fraud revenue says Trusteer LONDON, 6th April, 2010 Payment card servicing firm Visa has issued an alert (http://bit.ly/a6ovul) to its transaction processing members and their clients - retailers of all sizes - that trojan-driven keylogger incidents are on the rise. According to Trusteer, the rising number of keylogger attacks on retailers' till terminals is due to the fact that many units are Windows-driven and therefore susceptible to the same type of malware infections as office and home PCs. "Trojan-driven keylogger attacks have been on the rise for home and office PC users for some time, but companies and home users are getting wise to the problem and are installing IT security software on their machines," said Mickey Boodaei, CEO of the browser security and fraud prevention specialist.

Read more: Keylogger sophistication rising as criminals look for new sources of card fraud revenue says...

 Imperva Strengthens ThreatRadar Service with Cyveillance Anti-Phishing Data Feed   Combination of Comprehensive Data Feed and Leading Automated Defense Service Provides Proactive Protection Against Phishing Attacks  

REDWOOD SHORES, CALIF. / ARLINGTON, VA., April 6, 2010 – Imperva, the data security leader and Cyveillance, a world leader in cyber intelligence, today announced a partnership to shield organizations against growing phishing attacks. Under the agreement, Imperva integrated the Cyveillance Anti-Phishing Data Feed as part of its ThreatRadar service to further enhance its SecureSphere Web Application Firewall, enabling enterprises to deploy comprehensive reputation-based security through proactive detection of phishing threats before they become a problem.  

Read more: imperva threatradar