Advertisement
Blogs
Subscribe to DFI News

The Lead

One year after the cybercrime underground slashed the price of a stolen identity by as much as 37 percent due to a glut in the black market, the price tag for a pilfered ID has inched upward again.

Price Tag Rises for Stolen Identities Sold in the Underground

December 16, 2014 | by Kelly Jackson Higgins | Comments

One year after the cybercrime underground slashed the price of a stolen identity by as much as 37 percent due to a glut in the black market, the price tag for a pilfered ID has inched upward again.               

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Running Malware Analysis Apps as Docker Containers

December 18, 2014 11:22 am | by Lenny Zeltser | Comments

A new REMnux project initiative provides Docker images of Linux applications useful for malware analysis, with the goal of making it easier for investigators start using malware forensics tools that otherwise might be awkward to set up.

TOPICS:
Two new surveys show how easy enterprises make it for attackers to steal vast quantities of data with just a few successful breaches of employee machines: Employees typically are given far more access to sensitive data than they need to get their jobs don

Employees Still Get More Access than They Need

December 10, 2014 11:13 am | by Ericka Chickowski | Comments

Two new surveys show how easy enterprises make it for attackers to steal vast quantities of data with just a few successful breaches of employee machines: Employees typically are given far more access to sensitive data than they need to get their jobs done, and enterprises don't do enough to track access behavior.

TOPICS:
When a retailer’s credit card systems get breached by hackers, banks usually can tell which merchant got hacked soon after those card accounts become available for purchase at underground cybercrime shops.

Toward a Breach Canary for Data Brokers

December 9, 2014 11:23 am | by Editor | Comments

When a retailer’s credit card systems get breached by hackers, banks usually can tell which merchant got hacked soon after those card accounts become available for purchase at underground cybercrime shops.             

TOPICS:
Advertisement
Everyone has the right to privacy, said Troels Oerting, head of the Europol’s   European Cybercrime Center (EC3), at Georgetown Law’s Cybercrime2020 conference.   However, he went on, if you break your contract with society, that right can be   taken away

EC3 Head Paints Bleak Cybercrime Picture

December 8, 2014 10:39 am | by Editor | Comments

Everyone has the right to privacy, said Troels Oerting, head of the Europol’s European Cybercrime Center (EC3), at Georgetown Law’s Cybercrime2020 conference. However, he went on, if you break your contract with society, that right can be taken away.

TOPICS:
A new report from the U.S. Treasury Department found that a majority of bank account takeovers by cyberthieves over the past decade might have been thwarted had affected institutions known to look for and block transactions coming through Tor, a global co

Treasury Dept: Tor a Big Source of Bank Fraud

December 8, 2014 10:22 am | by Editor | Comments

A new report from the U.S. Treasury Department found that a majority of bank account takeovers by cyber thieves over the past decade might have been thwarted had affected institutions known to look for and block transactions coming through Tor, a global communications network that helps users maintain anonymity by obfuscating their true location online.

TOPICS:
Phones from low-cost, third-tier vendors in Asia and Africa have been affected, but that doesn't mean it can't happen here.

DeathRing Malware Found Pre-installed on Smartphones

December 5, 2014 10:11 am | by Jai Vijayan | Comments

Phones from low-cost, third-tier vendors in Asia and Africa have been affected, but that doesn't mean it can't happen here.                                    

TOPICS:
Paul Kocher, one of the country’s leading cryptographers, says he thinks the   explanation for the world’s dismal state of digital security may lie in two   charts.

Hacked vs. Hackers: Game On

December 3, 2014 10:24 am | by Nicole Perlroth | Comments

Paul Kocher, one of the country’s leading cryptographers, says he thinks the explanation for the world’s dismal state of digital security may lie in two charts.                         

TOPICS:
The field of incident response, forensics, and malware analysis is full of   thrilling hunts and exciting investigations where you have an opportunity to   aggressively pursue the activities of adversaries. While technical acumen   certainly supports thes

How to Track Your Malware Analysis Findings

December 2, 2014 11:30 am | by Anuj Soni | Comments

The field of incident response, forensics, and malware analysis is full of thrilling hunts and exciting investigations where you have an opportunity to aggressively pursue the activities of adversaries. While technical acumen certainly supports these efforts, a truly successful execution requires both a well-crafted process and detailed documentation of the journey through that process. 

TOPICS:
Advertisement
Abuse of privileged accounts has been understood for a long time to be a major security concern, since it opens up broad access to an organization’s data and IT resources. Up to now, however, the focus has mainly been on how this applies to the so-called

Look for More Attacks Coming from Privileged Accounts

December 1, 2014 10:24 am | by Brian Robinson | Comments

Abuse of privileged accounts has been understood for a long time to be a major security concern, since it opens up broad access to an organization’s data and IT resources. Up to now, however, the focus has mainly been on how this applies to the so-called insider threat.

TOPICS:
Underground cybercrime shops that sell credit and debit card accounts stolen from retailers are slashing prices and promoting their own Black Friday and Cyber Monday sales as fraudsters gear up for the busy holiday shopping season.

Black Friday, Cyber Monday for Crooks, Too!

December 1, 2014 10:14 am | by Editor | Comments

Underground cybercrime shops that sell credit and debit card accounts stolen from retailers are slashing prices and promoting their own Black Friday and Cyber Monday sales as fraudsters gear up for the busy holiday shopping season.     

TOPICS:

Cell Phone Tracking via Call Detail Records

November 25, 2014 7:07 am | by Larry E. Daniel | Comments

We live in a world today where individuals’ movements and locations are being recorded in many different ways. These movements and locations are commonly being used as evidence in civil, criminal, and domestic litigation. It is of paramount importance that anyone who is involved in litigation that uses cellular location evidence understands the appropriate and inappropriate use of this type of location data.

TOPICS:
Mixing upper and lower case letters, numbers and special characters doesn’t make passwords any harder for hackers to crack, only increasing the number of characters does, according to new research from Trustwave.

The Secret Life of Passwords

November 24, 2014 4:13 am | by Editor | Comments

Yes, I understand why passwords are universally despised: the strains they put on our memory, the endless demand to update them, their sheer number. I hate them, too. But there is more to passwords than their annoyance. In our authorship of them, in the fact that we construct them so that we (and only we) will remember them, they take on secret lives.

TOPICS:
A study of published intelligence on three major malware families used in Russia's cyberespionage operations shows a highly coordinated, targeted, and stealthy strategy.

Russian Cyber Espionage Under the Microscope

November 21, 2014 10:19 am | by Kelly Jackson Higgins | Comments

A study of published intelligence on three major malware families used in Russia's cyberespionage operations shows a highly coordinated, targeted, and stealthy strategy.                       

TOPICS:
We live in a world today where individuals’ movements and locations are being recorded in many different ways. These movements and locations are commonly being used as evidence in civil, criminal and domestic litigation. It is of paramount importance that

Cell Phone Tracking via Call Detail Records

November 19, 2014 10:34 am | by Larry E. Daniel | Comments

We live in a world today where individuals’ movements and locations are being recorded in many different ways. These movements and locations are commonly being used as evidence in civil, criminal and domestic litigation. It is of paramount importance that anyone who is involved in litigation that uses cellular location evidence understands the appropriate and inappropriate use of this type of location data.

TOPICS:
ISIS members have proven exceptionally difficult to track due a proper use of technology tools, like application for encryption, social media platforms and encrypted instant messaging platforms. Recently the media announced that ISIS has released a manual

ISIS Keeps Getting Better at Avoiding US Surveillance

November 18, 2014 12:14 pm | by Pierluigi Paganini | Comments

ISIS members have proven exceptionally difficult to track due a proper use of technology tools, like application for encryption, social media platforms and encrypted instant messaging platforms. Recently the media announced that ISIS has released a manual for its militants, titled “How to Tweet Safely Without Giving out Your Location to NSA," that explain how avoid surveillance.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading