Advertisement
News
Subscribe to DFI News

The Lead

China and "one or two" other countries are capable of mounting cyber attacks that would shut down the electric grid and other critical systems in parts of the United States, according to Adm. Michael Rogers, director of the National Security Agency and he

NSA Director Warns China Can Damage US Infrastructure

November 21, 2014 | by Ken Dilanian, Associated Press | Comments

China and "one or two" other countries are capable of mounting cyber attacks that would shut down the electric grid and other critical systems in parts of the United States, according to Adm. Michael Rogers, director of the National Security Agency and head of U.S. Cyber Command.

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

MIT has received $15 million in funding from the William and Flora Hewlett Foundation to establish an initiative aimed at laying the foundations for a smart, sustainable cybersecurity policy to deal with the growing cyber threats faced by governments, bus

Cybersecurity Myths

November 25, 2014 6:52 am | Comments

Despite the ongoing media commentary and “best practices” memos, consultant Adam Epstein of Third Creek Advisors notes that board members of small-cap companies and those considering or preparing initial public offerings are still befuddled by persistent myths on this topic.

TOPICS:

Project Targets Automotive Vulnerabilities

November 25, 2014 5:32 am | by Justin Pritchard, Associated Press | Comments

White hat hackers have demonstrated that they could create the electronic equivalent of a skeleton key to unlock car's networks. The project's goal is more than just to plug vulnerabilities--it is to reconceive the most critical lines of computer code that control the car in a way that could make them invulnerable to some of the major known threats.   

TOPICS:
FBI Director James Comey has compared Chinese hackers to a "drunk burglar" — not so subtle, but prolific and reckless enough to cost US companies billions each year.

Hackers Blackmail Sony Pictures

November 25, 2014 5:21 am | Comments

Yesterday, employees across the Sony Pictures offices were greeted with a strange picture as they tried to login to their computers. Computers at the company were completely unresponsive, showing a glowering CGI skeleton, a series of URL addresses, and a threatening message from a hacker group that identifies itself as #GOP. 

TOPICS:
Advertisement

Competition Battles Fingerprint and Iris Spoofing

November 25, 2014 5:16 am | Comments

A competition that challenges academic and private institutions to present solutions to fingerprint or iris spoofing is set to hold its fourth edition, with organisers saying it will play a “crucial” role in evaluating the current state of the technology.  

TOPICS:
The Federal Bureau of Investigation will soon open its Malware Investigator   portal to the private sector. Malware Investigator, which the agency began   developing in 2013 based on the success of its Binary Analysis Characterization and Storage System

Regin: Most Sophisticated Malware Yet

November 24, 2014 5:15 am | Comments

A cyber snooping operation reminiscent of the Stuxnet worm and billed as the world's most sophisticated computer malware is targeting Russian and Saudi Arabian telecoms companies. Cyber security company Symantec said the malware, called "Regin", is probably run by a western intelligence agency and in some respects is more advanced in engineering terms than Stuxnet.

TOPICS:
GFI Software released the findings of an independent study into how workers use company provided computers and laptops for personal activities, and the direct impact that personal use can have on the organization.

Using Company Devices for Personal Activities Leads to Data Loss

November 21, 2014 11:55 am | Comments

GFI Software released the findings of an independent study into how workers use company provided computers and laptops for personal activities, and the direct impact that personal use can have on the organization.           

TOPICS:
On November 10, a 12-year-old girl left her home in the Baltimore suburb of Nottingham at 7:30am, heading to her middle school. She never returned home. Her digital identities played a role in the forensics work used to track down her abductor. But they a

12-year-old's Online Life Leads to Abduction

November 21, 2014 11:00 am | by Sean Gallagher, Ars Technica | Comments

On November 10, a 12-year-old girl left her home in the Baltimore suburb of Nottingham at 7:30am, heading to her middle school. She never returned home. Her digital identities played a role in the forensics work used to track down her abductor. But they also played a major role in her abduction.

TOPICS:
 Dissenters within the National Security Agency, led by a senior agency executive, warned in 2009 that the program to secretly collect American phone records wasn't providing enough intelligence to justify the backlash it would cause if revealed, current

Some in NSA Warned of Backlash

November 20, 2014 1:57 pm | by Ken Dilanian, Associated Press | Comments

Dissenters within the National Security Agency, led by a senior agency executive, warned in 2009 that the program to secretly collect American phone records wasn't providing enough intelligence to justify the backlash it would cause if revealed, current and former intelligence officials say.

TOPICS:
Advertisement
In the next few months hackers will try to penetrate the cyber defenses of Britain's major banks and steal information about millions of customers. But for once they'll be welcome.

Hackers to Probe Cybercrime Defenses at British Banks

November 20, 2014 1:48 pm | by Steve Slater and Matt Schuffham, Reuters | Comments

In the next few months hackers will try to penetrate the cyber defenses of Britain's major banks and steal information about millions of customers. But for once they'll be welcome.                   

TOPICS:
Encrypted communications is very en vogue post-Snowden, but there can be unintended consequences. The growing use of encryption to address privacy concerns is creating perfect conditions for cyber criminals to hide malware inside encrypted transactions, a

Malware Authors Making a Payday Off Encryption

November 20, 2014 12:33 pm | by Tara Seals, Infosecurity Magazine | Comments

Encrypted communications is very en vogue post-Snowden, but there can be unintended consequences. The growing use of encryption to address privacy concerns is creating perfect conditions for cyber criminals to hide malware inside encrypted transactions, and even reducing the level of sophistication required for malware to avoid detection.

TOPICS:
It’s by no means complete yet, but the transition to a mobile IT environment in government is well established. Parallel with that, however, is the expectation that mobile communications will be able to deliver all that society expects in the way of seaml

5G Will Power Network of the Future

November 20, 2014 12:28 pm | by Brian Robinson, GCN | Comments

It’s by no means complete yet, but the transition to a mobile IT environment in government is well established. Parallel with that, however, is the expectation that mobile communications will be able to deliver all that society expects in the way of seamless audio, video streaming and fast transfer of multi-megabyte data files.  

TOPICS:
Mobile security firm Lookout has discovered a more sophisticated variant of the NotCompatible Android botnet which it says targets enterprise networks through compromised mobile devices.

Botnet Infects Android, Infiltrates Corporate Networks

November 20, 2014 12:17 pm | by Doug Drinkwater, SC Magazine | Comments

Mobile security firm Lookout has discovered a more sophisticated variant of the NotCompatible Android botnet which it says targets enterprise networks through compromised mobile devices.                  

TOPICS:
Leading prosecutors in New York and London police plan to embed staff in each others’ offices, officials say, increasing transatlantic collaboration in an effort to combat cybercrime.

London Police and NYC Prosecutors to Swap Staff in Cybercrime Fight

November 20, 2014 12:08 pm | by Sam Frizell, Time | Comments

Leading prosecutors in New York and London police plan to embed staff in each others’ offices, officials say, increasing transatlantic collaboration in an effort to combat cyber crime.                   

TOPICS:
Leading Democrats in both houses of Congress sent letters to 16 major banks and other financial firms requesting detailed information about recent data breaches and briefings from corporate data security officials.

House, Senate Democrats Seek Details on Data Breaches

November 19, 2014 9:57 am | by Reuters | Comments

Leading Democrats in both houses of Congress sent letters to 16 major banks and other financial firms requesting detailed information about recent data breaches and briefings from corporate data security officials.          

TOPICS:
Attackers will continue to resort to non-amplification attacks when there are not enough vulnerable systems available to exploit for reflection methods.There will be a rise in mobile DDoS attacks as emerging countries increase smartphone subscriber usage.

DDoS Attacks Shrinking, Switching to Mobile

November 19, 2014 9:34 am | by Black Lotus | Comments

Attackers will continue to resort to non-amplification attacks when there are not enough vulnerable systems available to exploit for reflection methods.There will be a rise in mobile DDoS attacks as emerging countries increase smartphone subscriber usage.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading