Advertisement
News
Subscribe to DFI News

The Lead

Heartbleed Bug Affects Android Phones, Other Devices

April 15, 2014 | by Dan Goodin, Ars Technica | Comments

The catastrophic Heartbleed security bug that has already bitten Yahoo Mail, the Canada Revenue Agency, and other public websites also poses a formidable threat to end-user applications and devices, including millions of Android handsets, security researchers warn.

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

First Phase of TrueCrypt Audit Finds No Backdoors

April 15, 2014 9:58 am | by Zeljka Zorz, Help Net Security | Comments

Investigator's have found no evidence of backdoors or otherwise intentionally malicious code in the assessed areas of TrueCrypt's Windows kernel code, bootloader, filesystem driver or areas around this code.            

TOPICS:

Chad Tilbury Joins CrowdStrike as Technical Director

April 14, 2014 10:39 am | Comments

Tilbury will provide technical leadership for the services team, driving innovation to support customers in a variety of offerings, including incident response, remediation, forensic support, penetration testing, intelligence operations, and counter-threat assessments.    

TOPICS:

Appeals Court Overturns AT&T Hacker's Sentence

April 14, 2014 10:21 am | by Zeljka Zorz, Help Net Security | Comments

A US federal appeals court has vacated the conviction and sentence received by Andrew "weev" Auernheimer for the AT&T iPad hack.                                  

TOPICS:
Advertisement

Nine Charged in Conspiracy Using Zeus Malware

April 14, 2014 10:10 am | by DOJ | Comments

Nine alleged members of a wide-ranging racketeering enterprise and conspiracy who infected thousands of business computers with malicious software known as “Zeus” have been charged in an indictment.               

TOPICS:

Feds Address Antitrust Concerns on Cyberthreat Sharing

April 14, 2014 9:59 am | by William Jackson, Information Week | Comments

The Justice Department and the Federal Trade Commission are trying to allay private-sector fears that sharing cyberthreat information could be seen as a violation of antitrust laws.                   

TOPICS:

Obama Lets NSA Exploit Some Internet Flaws

April 14, 2014 8:44 am | by David Sanger, The New York Times | Comments

Stepping into a heated debate within the nation’s intelligence agencies, President Obama has decided that when the National Security Agency discovers major flaws in Internet security, it should — in most circumstances — reveal them to assure that they will be fixed, rather than keep mum so that the flaws can be used in espionage or cyber attacks.

TOPICS:

Hackers Forge Credit Cards with South Korean Data

April 11, 2014 10:23 am | by Reuters | Comments

Hackers stole the personal information of about 200,000 South Korean credit card users, using some to make fake cards and rack up fraudulent charges of about 120 million won ($115,400), an official of the country's financial regulator say.   

TOPICS:

Has the NSA Utilized the Heartbleed Bug?

April 11, 2014 10:06 am | by Kim Zetter, Wired | Comments

The Heartbleed bug is also unusually worrisome because it could possibly be used by hackers to steal your usernames and passwords — for sensitive services like banking, ecommerce, and web-based email — and by spy agencies to steal the private keys that vulnerable web sites use to encrypt your traffic to them.

TOPICS:
Advertisement

Man Denies Inserting Heartbleed Security Flaw Deliberately

April 11, 2014 9:49 am | by Ben Grubb, The Sydney Morning Herald | Comments

The German software developer who introduced a security flaw into an encryption protocol used by millions of websites globally says he did not insert it deliberately as some have suggested.                 

TOPICS:

Military Academies Take on the NSA

April 10, 2014 3:56 pm | by Michael Hill, Associated Press | Comments

A team of caffeine-fueled cadets is spending long days this week in a computer lab trying to fend off threats cooked up by experts at the National Security Agency. The annual Cyber Defense Exercise will determine which of the five service academies can create computer networks that can best withstand the four-day barrage.

TOPICS:

Cooling the US-China Cyber War

April 10, 2014 10:42 am | by Joe Silver, Ars Technica | Comments

Are cyber attacks, security breaches, and mounting distrust between the US and Chinese governments ushering in a new Cold War era? Given US officials’ rhetoric and actions in recent months, it might appear that such a sustained state of political and military tensions between the two superpowers is a serious threat.

TOPICS:

Whitehat Hacker Nabbed for Good Deed

April 10, 2014 10:16 am | by Zeljka Zorz, Help Net Security | Comments

Daving Helkowski, a software architect/engineer working for software consultancy Canton Group, has made a serious mistake that has already cost him his job and might end up costing him even more.               

TOPICS:

Internet Users Can't Thwart 'Heartbleed' Bug Yet

April 10, 2014 9:50 am | by Jim Finkle, Reuters | Comments

Security experts warn there is little Internet users can do to protect themselves from the recently uncovered "Heartbleed" bug that exposes data to hackers, at least not until vulnerable websites upgrade their software.         

TOPICS:

(ISC)² to Develop Cybersecurity Education throughout Global Academic Community

April 10, 2014 9:34 am | by (ISC)² | Comments

Accredited academic institutions now have access to new resources and support from (ISC)², the not-for-profit membership body of certified information and software security professionals, with the launch of its Global Academic Program. 

TOPICS:

Nuix Reaches Milestone Helping Children through Room to Read

April 9, 2014 3:29 pm | by Nuix | Comments

Nuix has announced its philanthropic product Proof Finder has reached a new milestone, raising $150,000 for Room to Read. Room to Read is a global non-profit organization transforming the lives of children across Asia and Africa by focusing on literacy and gender equality in education.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading