Advertisement
Blogs
Subscribe to DFI News

The Lead

What does that 'look like'?

August 22, 2014 | by Harlan Carvey | Comments

We've heard this question a lot, haven't we? I attended a conference about 2 1/2 years ago, and the agenda for that conference had about half a dozen or more presentations that contained "APT" in their title. I attended several of them, and I have to say ... I walked out of some of them.

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

At no time in history has there been a greater need to hire security professionals to protect and defend infrastructures from an inexhaustible onslaught of organized crime, industrial espionage, and nation-state attacks.

Cybersecurity Hiring Crisis: Rockstars, Anger and the Billion Dollar Problem

August 28, 2014 11:12 am | by Violet Blue | Comments

At no time in history has there been a greater need to hire security professionals to protect and defend infrastructures from an inexhaustible onslaught of organized crime, industrial espionage, and nation-state attacks.         

TOPICS:
Services are up and running again after a denial of service took down Sony's PlayStation Network for much of Sunday, coinciding with a bomb threat on American Airlines flight 362, which carried John Smedley, president of Sony Online Entertainment. The thr

Sony, XBox Victims of DDoS, Hacktivist Threats

August 27, 2014 11:11 am | by Sara Peters | Comments

Services are up and running again after a denial of service took down Sony's PlayStation Network for much of Sunday, coinciding with a bomb threat on American Airlines flight 362, which carried John Smedley, president of Sony Online Entertainment. The threats caused the airline to divert the flight.

TOPICS:
South Korean authorities have revealed a massive data breach that has affected well over half of the country's 50 million citizens.

220 Million Records Stolen, 16 Arrested in Massive South Korean Data Breach

August 27, 2014 10:19 am | by Lee Munson | Comments

South Korean authorities have revealed a massive data breach that has affected well over half of the country's 50 million citizens.                                 

TOPICS:
Advertisement
Governor Jerry Brown of California on Monday signed into law a measure that requires smartphones sold in California to include smarter antitheft technology, a feature that lawmakers hope will help reduce phone theft.

California Governor Signs Law Requiring 'Kill Switch' on Smartphones

August 26, 2014 10:19 am | by Brian Chen | Comments

Governor Jerry Brown of California on Monday signed into law a measure that requires smartphones sold in California to include smarter antitheft technology, a feature that lawmakers hope will help reduce phone theft.         

TOPICS:
Websense Security Labs has come across an interesting campaign, targeting Russian nationals, trying to lure them to download and run executables on their computers, under the guise of attacking Western government websites.

Kelihos Botnet Trying to Expand by Harnessing Russian National Sentiments

August 26, 2014 10:11 am | by Editor | Comments

Websense Security Labs has come across an interesting campaign, targeting Russian nationals, trying to lure them to download and run executables on their computers, under the guise of attacking Western government websites.       

TOPICS:
There is a severe shortage of information security professionals, and leading industry experts say it's only getting worse. Word among attendees at Black Hat USA 2014 conference was that there are more jobs in cybersecurity than people to fill them.

Cybersecurity's Hiring Crisis: A Troubling Trajectory

August 25, 2014 11:05 am | by Violet Blue | Comments

There is a severe shortage of information security professionals, and leading industry experts say it's only getting worse. Word among attendees at Black Hat USA 2014 conference was that there are more jobs in cybersecurity than people to fill them.

TOPICS:
I’ve seen some email threads on a few listserv groups talking about developing a capability to take indicators from threat feeds and automatically generating signatures that can be used in various detection technologies. I have some issues with taking thi

Feeds, Feeds and More Feeds

August 25, 2014 10:37 am | by Editor | Comments

I’ve seen some email threads on a few listserv groups talking about developing a capability to take indicators from threat feeds and automatically generating signatures that can be used in various detection technologies. I have some issues with taking this approach and thought a blog post on it may be better than replying to these threads.

TOPICS:
How are ex-military and ex-hackers different? For starters, security guys with a military background are more likely to have a “traditional career.” This typically includes a degree from a four-year university, a series of jobs with certifications, and fo

Hacker or Military? Best of Both in Cyber Security

August 22, 2014 9:06 am | by John Dickson | Comments

How are ex-military and ex-hackers different? For starters, security guys with a military background are more likely to have a “traditional career.” This typically includes a degree from a four-year university, a series of jobs with certifications, and formal recognition that one would expect from a military person.

TOPICS:
Advertisement
I've been an adjunct professor at NYU Poly for almost two years now. It's been a great experience for a number of reasons, one of which is because I'm teaching a hot topic: Vulnerability Analysis and Exploitation.

Learning Exploitation with FSExploitMe

August 21, 2014 9:28 am | by Brad Antoniewicz | Comments

I've been an adjunct professor at NYU Poly for almost two years now. It's been a great experience for a number of reasons, one of which is because I'm teaching a hot topic: Vulnerability Analysis and Exploitation.           

TOPICS:
The web intelligence firm Recorded Future has posted two stories about how al Qaeda is using new encryption software in response to the Snowden disclosures.

The Security of al Qaeda Encryption Software

August 20, 2014 11:32 am | by Bruce Schneier | Comments

The web intelligence firm Recorded Future has posted two stories about how al Qaeda is using new encryption software in response to the Snowden disclosures.                           

TOPICS:
auto_rip is a wrapper script for Harlan Carvey's RegRipper and the script has a few updates. The script's home has always been on the RegRipper Google Code site but Google dropped support for adding new downloads. As a result, I thought it might be helpfu

auto_rip, tr3secure_collection & DFS Updates

August 20, 2014 10:09 am | by Corey Harrell | Comments

auto_rip is a wrapper script for Harlan Carvey's RegRipper and the script has a few updates. The script's home has always been on the RegRipper Google Code site but Google dropped support for adding new downloads. As a result, I thought it might be helpful to make newer versions available at different places since Google Code can no longer be used.

TOPICS:
If you have an account and were asked to put a price on a monthly service fee, how much money would you pay to be inspired, to keep up with news events, or to stay in touch with family, friends and colleagues? You're paying for it now, of course, though n

How will you pay for the internet of the future?

August 19, 2014 10:58 am | by Lisa Vaas | Comments

If you have an account and were asked to put a price on a monthly service fee, how much money would you pay to be inspired, to keep up with news events, or to stay in touch with family, friends and colleagues? You're paying for it now, of course, though not with money.

TOPICS:
A recently unearthed targeted attack campaign suggests that Pakistan is evolving from hacktivism to cyber espionage.

Pakistan the Latest Cyberspying Nation

August 19, 2014 10:47 am | by Kelly Jackson Higgins | Comments

A recently unearthed targeted attack campaign suggests that Pakistan is evolving from hacktivism to cyber espionage.                                      

TOPICS:
Imagine discovering a secret language spoken only online by a knowledgeable and learned few. Over a period of weeks, as you begin to tease out the meaning of this curious tongue and ponder its purpose, the language appears to shift in subtle but fantastic

Lorem Ipsum: Of Good & Evil, Google & China

August 18, 2014 9:28 am | by Editor | Comments

Imagine discovering a secret language spoken only online by a knowledgeable and learned few. Over a period of weeks, as you begin to tease out the meaning of this curious tongue and ponder its purpose, the language appears to shift in subtle but fantastic ways, remaking itself daily before your eyes. And just when you are poised to share your findings with the rest of the world, the entire thing vanishes.

TOPICS:
Thousands of Computers Open to Eavesdropping and Hijacking

Thousands of Computers Open to Eavesdropping and Hijacking

August 15, 2014 10:51 am | by Lisa Vaas | Comments

There's a gaping hole in thousands of unsuspecting people's computers that lets any random internet passerby not only look over their shoulder but reach through to take over their systems. The hole is caused by a remote access tool: specifically, unsecured use of a product known as Virtual Network Computing (VNC).

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading