Advertisement
News
Subscribe to DFI News

The Lead

It has been over a year since The Guardian reported the first story on the National Security Agency’s surveillance programs based on the leaks from former NSA contractor Edward Snowden, yet the national conversation remains largely mired in a simplistic d

Surveillance Costs: The NSA's Impact on the Economy, Internet Freedom & Cybersecurity

July 29, 2014 | by Danielle Kehl,Kevin Bankston,Robyn Greene,Robert Morgus,New America Foundation | Comments

It has been over a year since The Guardian reported the first story on the National Security Agency’s surveillance programs based on the leaks from former NSA contractor Edward Snowden, yet the national conversation remains largely mired in a simplistic debate over the tradeoffs between national security and individual privacy. It is time to start weighing the overall costs and benefits more broadly.

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Officials with the Tor privacy service have uncovered an attack that may have revealed identifying information or other clues of people operating or accessing anonymous websites and other services over a five-month span beginning in February.

Tor Attack Tried Uncover Users for Five Months

July 30, 2014 3:11 pm | by Dan Goodin, Ars Technica | Comments

Officials with the Tor privacy service have uncovered an attack that may have revealed identifying information or other clues of people operating or accessing anonymous websites and other services over a five-month span beginning in February. 

TOPICS:
Cyber criminals have been launching DDoS attacks from Amazon cloud-based bots after gaining access via a known vulnerability in open source search engine Elasticsearch, according to researchers.

DDoS-ers Launch Attacks from Amazon EC2

July 30, 2014 2:59 pm | by Infosecurity | Comments

Cyber criminals have been launching DDoS attacks from Amazon cloud-based bots after gaining access via a known vulnerability in open source search engine Elasticsearch, according to researchers.               

TOPICS:
High-level Chinese hackers recently tried to break into a key Canadian computer system, forcing Ottawa to isolate it from the main government network, a senior official said on Tuesday.

Canada Says China Tried to Hack into Key Computer System

July 29, 2014 11:12 am | by Reuters | Comments

High-level Chinese hackers recently tried to break into a key Canadian computer system, forcing Ottawa to isolate it from the main government network, a senior official said on Tuesday.                   

TOPICS:
Advertisement
Federal Chief Information Security Officers (CISOs) and information security executives face a number of challenges in today's dynamic, fast-paced environment.

How to Build a Federal Information Security Team

July 29, 2014 10:01 am | by (ISC)2 Writers Bureau, Information Week | Comments

Federal Chief Information Security Officers (CISOs) and information security executives face a number of challenges in today's dynamic, fast-paced environment. These challenges include advanced persistent threats, system vulnerabilities, and regulatory compliance, to name a few.

TOPICS:

Stalking Predators Online Stresses Cyber Cops

July 28, 2014 11:11 am | by Maya Lau, The Times | Comments

To string along suspected sex offenders, Bryan Montgomery carries out intimate conversations with them — sometimes lasting a year — while posing as a juvenile on social media. The job brings psychological stress, which Montgomery acknowledges. 

TOPICS:
The Russian Ministry of Internal Affairs (MVD) has offered a 3.9 million ruble (approximately $111,000) contract for technology that can identify the users of Tor, the encrypted anonymizing network used by Internet users seeking to hide their activities f

Russia Offers $111,000 Bounty to Break Tor Privacy

July 28, 2014 10:56 am | by Sean Gallagher, Ars Technica | Comments

The Russian Ministry of Internal Affairs (MVD) has offered a 3.9 million ruble (approximately $111,000) contract for technology that can identify the users of Tor, the encrypted anonymizing network used by Internet users seeking to hide their activities from monitoring by law enforcement, government censors, and others.

TOPICS:
SiQuest Corporation has added a feature to its Internet Examiner Toolkit (IXTK). With the current release of Version 4.0.1407.2503, IXTK now forensically recovers evidence of “watched YouTube videos” from the Unallocated Space and browser cache repositori

Software Forensically Recovers Watched YouTube Videos

July 28, 2014 10:32 am | by John Bradley | SiQuest Corporation | Comments

SiQuest Corporation has added a feature to its Internet Examiner Toolkit (IXTK). With the current release of Version 4.0.1407.2503, IXTK now forensically recovers evidence of “watched YouTube videos” from the Unallocated Space and browser cache repositories of computer hard drives, and the YouTube website directly.

TOPICS:
The prospect that classified capabilities could be revealed in a criminal case has meant that the most sophisticated surveillance technologies are not always available to law enforcement because they are classified, current and former.

How Spy Agencies Keep Their 'Toys' from Law Enforcement

July 28, 2014 10:05 am | by Ellen Nakashima, The Washington Post | Comments

The prospect that classified capabilities could be revealed in a criminal case has meant that the most sophisticated surveillance technologies are not always available to law enforcement because they are classified, current and former.    

TOPICS:
Advertisement
Have the UK police successfully broken anonymity on the internet? They certainly seemed to imply as much when the National Crime Agency proudly announced recently that it had made 660 arrests after an operation to identify people viewing indecent images o

Have Police Really Cracked Tor?

July 25, 2014 11:03 am | by Eerke Boiten and Julio Hernandez-Castro, The Conversation | Comments

Have the UK police successfully broken anonymity on the internet? They certainly seemed to imply as much when the National Crime Agency proudly announced recently that it had made 660 arrests after an operation to identify people viewing indecent images of children online. The announcement raises questions about just how anonymous it is possible to be online.

TOPICS:
Hackers only need to find one weak point to steal valuable information. On the flip side, you need to account for every possible vulnerability across your entire infrastructure. Doesn't seem fair, but it's the world we live in

Hackers Only Need to Get It Right Once, Security Needs to Get It Right Every Time

July 25, 2014 10:46 am | by Chris Triolo, SC Magazine | Comments

Hackers only need to find one weak point to steal valuable information. On the flip side, you need to account for every possible vulnerability across your entire infrastructure. Doesn't seem fair, but it's the world we live in.       

TOPICS:
Microsoft's Internet Explorer (IE) has become the most patched software   product, receiving more security patches in the first six months of this year   than Adobe or Oracle software, a report by Bromium Labs has found.

Internet Explorer is the 'Sweet Spot' for Cyber Criminals

July 25, 2014 10:25 am | by Lee Bell, the Inquirer | Comments

Microsoft's Internet Explorer (IE) has become the most patched software product, receiving more security patches in the first six months of this year than Adobe or Oracle software, a report by Bromium Labs has found.        

TOPICS:

How Hackers Hid a Money-mining Botnet in Amazon's Cloud

July 24, 2014 11:11 am | by Andy Greenberg, Wired | Comments

Hackers have long used malware to enslave armies of unwitting PCs, but security researchers Rob Ragan and Oscar Salazar had a different thought: Why steal computing power from innocent victims when there’s so much free processing power out there for the taking?

TOPICS:
Security experts are warning that tens of thousands of WordPress sites have been compromised thanks to a known vulnerability in the MailPoet plug-in, leading to mass defacements, spam and outages.

Up to 50,000 WordPress Users Hit by MailPoet Malware Attack

July 24, 2014 11:01 am | by Infosecurity | Comments

Security experts are warning that tens of thousands of WordPress sites have been compromised thanks to a known vulnerability in the MailPoet plug-in, leading to mass defacements, spam and outages.               

TOPICS:
Some of the hottest tickets in town — to Broadway hits, Jay-Z and Justin Timberlake concerts, a New York Yankees-Boston Red Sox game — were snapped up by an international ring of cyber thieves who commandeered more than 1,000 StubHub users' accounts to ma

Cyber Thieves Sell $1.6M in StubHub Tickets

July 24, 2014 9:46 am | by Associated Press | Comments

Some of the hottest tickets in town — to Broadway hits, Jay-Z and Justin Timberlake concerts, a New York Yankees-Boston Red Sox game — were snapped up by an international ring of cyber thieves who commandeered more than 1,000 StubHub users' accounts to make big money by fraudulently buying tickets and reselling them, prosecutors said Wednesday.

TOPICS:
Last year two Darpa-funded security researchers spent months cracking into a Ford Escape and a Toyota Prius, terrifying each other with tricks. At the Black Hat security conference in Las Vegas next month, they’ll unveil a prototype intrusion-detection sy

Device Stops Hackers from Crashing Cars

July 23, 2014 11:20 am | by Andy Greenberg, Wired | Comments

Last year two Darpa-funded security researchers spent months cracking into a Ford Escape and a Toyota Prius, terrifying each other with tricks. At the Black Hat security conference in Las Vegas next month, they’ll unveil a prototype intrusion-detection system for automobiles. 

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading