Advertisement
Blogs
Subscribe to DFI News

The Lead

What does that 'look like'?

August 22, 2014 | by Harlan Carvey | Comments

We've heard this question a lot, haven't we? I attended a conference about 2 1/2 years ago, and the agenda for that conference had about half a dozen or more presentations that contained "APT" in their title. I attended several of them, and I have to say ... I walked out of some of them.

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

The web intelligence firm Recorded Future has posted two stories about how al Qaeda is using new encryption software in response to the Snowden disclosures.

The Security of al Qaeda Encryption Software

August 20, 2014 11:32 am | by Bruce Schneier | Comments

The web intelligence firm Recorded Future has posted two stories about how al Qaeda is using new encryption software in response to the Snowden disclosures.                           

TOPICS:
If you have an account and were asked to put a price on a monthly service fee, how much money would you pay to be inspired, to keep up with news events, or to stay in touch with family, friends and colleagues? You're paying for it now, of course, though n

How will you pay for the internet of the future?

August 19, 2014 10:58 am | by Lisa Vaas | Comments

If you have an account and were asked to put a price on a monthly service fee, how much money would you pay to be inspired, to keep up with news events, or to stay in touch with family, friends and colleagues? You're paying for it now, of course, though not with money.

TOPICS:
A recently unearthed targeted attack campaign suggests that Pakistan is evolving from hacktivism to cyber espionage.

Pakistan the Latest Cyberspying Nation

August 19, 2014 10:47 am | by Kelly Jackson Higgins | Comments

A recently unearthed targeted attack campaign suggests that Pakistan is evolving from hacktivism to cyber espionage.                                      

TOPICS:
Advertisement
Imagine discovering a secret language spoken only online by a knowledgeable and learned few. Over a period of weeks, as you begin to tease out the meaning of this curious tongue and ponder its purpose, the language appears to shift in subtle but fantastic

Lorem Ipsum: Of Good & Evil, Google & China

August 18, 2014 9:28 am | by Editor | Comments

Imagine discovering a secret language spoken only online by a knowledgeable and learned few. Over a period of weeks, as you begin to tease out the meaning of this curious tongue and ponder its purpose, the language appears to shift in subtle but fantastic ways, remaking itself daily before your eyes. And just when you are poised to share your findings with the rest of the world, the entire thing vanishes.

TOPICS:
Thousands of Computers Open to Eavesdropping and Hijacking

Thousands of Computers Open to Eavesdropping and Hijacking

August 15, 2014 10:51 am | by Lisa Vaas | Comments

There's a gaping hole in thousands of unsuspecting people's computers that lets any random internet passerby not only look over their shoulder but reach through to take over their systems. The hole is caused by a remote access tool: specifically, unsecured use of a product known as Virtual Network Computing (VNC).

TOPICS:
One of the main vulnerabilities used in the infamous Stuxnet attack — patched four years ago — is being used in attack attempts against millions of machines around the world, according to new data.

Stuxnet Exploits Still Alive & Well

August 15, 2014 10:43 am | by Kelly Jackson Higgins | Comments

One of the main vulnerabilities used in the infamous Stuxnet attack — patched four years ago — is being used in attack attempts against millions of machines around the world, according to new data.         

TOPICS:
In its latest quarterly filing to the Securities and Exchange Commission (SEC), Twitter broke down its user base, saying that up to 8.5 percent of its monthly active users — about 23 million — are automatons.

Good Bot, Bad Bot? 23M Twitter Accounts are Automated

August 14, 2014 10:13 am | by Lisa Vaas | Comments

In its latest quarterly filing to the Securities and Exchange Commission (SEC), Twitter broke down its user base, saying that up to 8.5 percent of its monthly active users — about 23 million — are automatons.           

TOPICS:
Black Hat USA 2014 hosted over 9,000 attendees in Las Vegas last week and featured 110 highly informative briefings. Don't fret if you missed it: Some of BHUSA's best talks have now been uploaded to YouTube.

BadUSB, Keynote Controversy: Black Hat USA 2014 Videos Now Online

August 14, 2014 9:48 am | by Violet Blue | Comments

Black Hat USA 2014 hosted over 9,000 attendees in Las Vegas last week and featured 110 highly informative briefings. Don't fret if you missed it: Some of BHUSA's best talks have now been uploaded to YouTube.            

TOPICS:
Advertisement
While Android phones are constantly targeted by cyber criminals, the iPhone is considered more secure. Now, leaked documents from one of the world's leading surveillance companies have reaffirmed the idea.

Apple's iOS Blocks Gov't Spying Efforts, Gamma's FinSpy Useless against iPhone

August 13, 2014 9:52 am | by Charlie Osborne | Comments

While Android phones are constantly targeted by cyber criminals, the iPhone is considered more secure. Now, leaked documents from one of the world's leading surveillance companies have reaffirmed the idea.             

TOPICS:

Where's the IR in DFIR Training?

August 13, 2014 9:12 am | by Corey Harrell | Comments

I'm writing this post to voice a concern about trainings for incident response. I am painting this picture with a broad stroke. The picture does not apply to every $vendor nor does it apply to every training course.         

TOPICS:
Anyone who works closely with me knows I love to define things. Why? Because I want to ensure that everyone I work with talks about things in the same way, and that clear expectations are established on projects. Things tend to go wrong in the eDiscovery

Five Best Practices for Dealing with Text in eDiscovery

August 12, 2014 10:58 am | by Maureen Holland | Comments

Anyone who works closely with me knows I love to define things. Why? Because I want to ensure that everyone I work with talks about things in the same way, and that clear expectations are established on projects. Things tend to go wrong in the eDiscovery process when assumptions are made.

TOPICS:
Thrifty attackers, are you tired of investing your dollars in a botnet that's constantly being disrupted by new anti-virus signatures and bot downtime? A "cloudbot" might be just what you seek.

CloudBot: A Free, Malwareless Alternative to Traditional Botnets

August 12, 2014 10:47 am | by Sara Peters | Comments

Thrifty attackers, are you tired of investing your dollars in a botnet that's constantly being disrupted by new anti-virus signatures and bot downtime? A "cloudbot" might be just what you seek.                

TOPICS:
It's no longer surprising when we hear a cryptocurrency exchange has suffered a security breach, but now a hacker has targeted mining pools — and managed to steal $83,000 in cryptocurrency as a result.

Hacker Hijacks ISPs, Steals $83,000 from Bitcoin Mining Pools

August 11, 2014 10:52 am | by Charlie Osborne | Comments

It's no longer surprising when we hear a cryptocurrency exchange has suffered a security breach, but now a hacker has targeted mining pools — and managed to steal $83,000 in cryptocurrency as a result.           

TOPICS:
Efforts to pressure the automobile industry into better locking down cyber security in automated features of modern cars has intensified as a collective of security researchers sent the CEOs at major auto firms an open letter calling for them to adopt a n

Automakers Openly Challenged to Bake in Security

August 11, 2014 10:38 am | by Kelly Jackson Higgins | Comments

Efforts to pressure the automobile industry into better locking down cyber security in automated features of modern cars has intensified as a collective of security researchers sent the CEOs at major auto firms an open letter calling for them to adopt a new five-star cyber safety program.

TOPICS:
Hackers only need to find one weak point to steal valuable information. On the flip side, you need to account for every possible vulnerability across your entire infrastructure. Doesn't seem fair, but it's the world we live in

In Fight With Hackers, We Are on Our Own

August 8, 2014 9:45 am | by Molly Wood | Comments

A computer security company — it is rarely a government entity — comes out with a new report. Millions of stolen passwords. Tens of millions. No, hundreds of millions. The point is apparent: This is a big deal. Then it becomes clear this company is not simply informing the world out of some sort of noblesse oblige: It is trying to make money.

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading