Advertisement
News
Subscribe to DFI News

The Lead

Cyber crime costs the global economy an estimated $400 billion a year, and as it grows in scale and sophistication, law enforcement is having to do the same.

Law Enforcement's High-tech Battle to Stop Cyber Crime

October 30, 2014 | by Maggie Lake, CNN | Comments

Cyber crime costs the global economy an estimated $400 billion a year, and as it grows in scale and sophistication, law enforcement is having to do the same. The U.S. secret service helped prevent over $1 billion in fraud losses from cyber crime last year, but it is up against skilled and organized international crime networks.

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

In his career-ending extramarital affair that came to light in 2012, General David Petraeus used a stealthy technique to communicate with his lover Paula Broadwell: the pair left messages for each other in the drafts folder of a shared Gmail account.

Hackers Hiding Data in Gmail Drafts

October 29, 2014 10:39 am | by Andy Greenberg, Wired | Comments

In his career-ending extramarital affair that came to light in 2012, General David Petraeus used a stealthy technique to communicate with his lover Paula Broadwell: the pair left messages for each other in the drafts folder of a shared Gmail account. Now hackers have learned the same trick.

TOPICS:
In its latest Emerging Cyber Threats Report, Georgia Tech warns about loss of   privacy; abuse of trust between users and machines; attacks against the   mobile ecosystem; rogue insiders; and the increasing involvement of   cyberspace in nation-state conf

Georgia Tech Releases 2015 Emerging Cyber Threats Report

October 29, 2014 10:30 am | by Georgia Institute of Technology | Comments

In its latest Emerging Cyber Threats Report, Georgia Tech warns about loss of privacy; abuse of trust between users and machines; attacks against the mobile ecosystem; rogue insiders; and the increasing involvement of cyberspace in nation-state conflicts.

TOPICS:
Federal prosecutors have opened a criminal investigation after the FBI raided the home of a suspected second whistleblower who passed on secret government documents about a terror watch list.

FBI Raids Home of Suspected Second Whistleblower

October 29, 2014 9:48 am | by Phil Muncaster, Infosecurity Magazine | Comments

Federal prosecutors have opened a criminal investigation after the FBI raided the home of a suspected second whistleblower who passed on secret government documents about a terror watch list.                 

TOPICS:
Advertisement
A coalition of security researchers has identified a Chinese cyberespionage group that appears to be the most sophisticated of any publicly known Chinese hacker unit and targets not only U.S. and Western government agencies but also dissidents inside and

Researchers Identify Sophisticated Chinese Cyberespionage Group

October 28, 2014 12:09 pm | by Ellen Nakashima, The Washington Post | Comments

A coalition of security researchers has identified a Chinese cyberespionage group that appears to be the most sophisticated of any publicly known Chinese hacker unit and targets not only U.S. and Western government agencies but also dissidents inside and outside China.

TOPICS:
Information security experts say espionage-focused attackers, apparently operating from Russia, have been using phishing e-mails and malware in multi-stage attacks designed to evade detection and steal political and military secrets.

Trail of Stolen Military, Government, Contractor Info Leads to Russia

October 28, 2014 11:35 am | by Mathew Schwartz, Gov Info Security | Comments

Information security experts say espionage-focused attackers, apparently operating from Russia, have been using phishing emails and malware in multi-stage attacks designed to evade detection and steal political and military secrets.     

TOPICS:
The University of Texas at San Antonio (UTSA) has been awarded a two-year, $400,000 grant from the Department of Homeland Security (DHS) to develop a DHS Scholars program, aimed toward building a future workforce for federal and private organizations addr

UTSA Awarded DHS Grant to Study Biological, Digital Threats

October 28, 2014 10:51 am | by Kris Rodriguez, Univ. of Texas at San Antonio | Comments

The University of Texas at San Antonio (UTSA) has been awarded a two-year, $400,000 grant from the Department of Homeland Security (DHS) to develop a DHS Scholars program, aimed toward building a future workforce for federal and private organizations addressing biological and digital threats.

TOPICS:
IBM has a new high-speed analysis and criminal investigation software that is designed to uncover hidden criminal threats buried deep inside massive volumes of disparate corporate data.

Big Data Uncovers Cyber Crime at High Speeds

October 28, 2014 10:31 am | by IBM | Comments

IBM has a new high-speed analysis and criminal investigation software that is designed to uncover hidden criminal threats buried deep inside massive volumes of disparate corporate data.                   

TOPICS:
Samsung's Knox security software for Android devices handles passwords in a way that undermines encryption, an anonymous researcher says.

Researcher Says Knox is Weak

October 27, 2014 12:34 pm | by Thomas Claburn, Information Week | Comments

Samsung's Knox security software for Android devices handles passwords in a way that undermines encryption, an anonymous researcher says.                                

TOPICS:
Advertisement
While revelations from Edward Snowden about the National Security Agency’s massive database of phone records have sparked a national debate about its constitutionality, another secretive database has gone largely unnoticed and without scrutiny.

Va Police Agencies Stockpile Private Phone Records

October 27, 2014 11:20 am | by G.W. Schulz, The Center for Investigative Reporting | Comments

While revelations from Edward Snowden about the National Security Agency’s massive database of phone records have sparked a national debate about its constitutionality, another secretive database has gone largely unnoticed and without scrutiny.

TOPICS:
The head of a sophisticated cybercrime ring which stole over $9 million from payment processor Worldpay back in 2008 has been sentenced to a hefty 11 years behind bars.

Estonian Ringleader Gets 11 Years for ATM Hack

October 27, 2014 10:56 am | by Infosecurity Magazine | Comments

The head of a sophisticated cybercrime ring which stole over $9 million from payment processor Worldpay back in 2008 has been sentenced to a hefty 11 years behind bars.                        

TOPICS:
FBI Director James Comey has compared Chinese hackers to a "drunk burglar" — not so subtle, but prolific and reckless enough to cost US companies billions each year.

White Hat Hackers Employed to Find Vulnerabilities

October 24, 2014 9:42 am | Comments

Cyber-crime is big business in the digital age, so a Bay Area security firm has hired a sophisticated group of hackers to break into computer systems. “White-hat hackers” deliberately break into computer systems and digital devices to find vulnerabilities before “black-hat hackers” can exploit them.  

TOPICS:
The sophisticated electronic components that are making modern cars safer, greener, and smarter are also making them dangerously vulnerable to cyber attacks.

Carmakers Ignore Hacking Risk

October 24, 2014 9:37 am | Comments

As high-tech features like adaptive cruise control, automatic braking and automatic parallel parking systems make cars smarter, it's also making them more vulnerable to hackers – a risk that an automotive security researcher says carmakers appear to be ignoring.

TOPICS:

Microsoft PowerPoint as an Attack Vector

October 24, 2014 9:34 am | Comments

Microsoft is scrambling to issue a Windows update after security researchers discovered a flaw in PowerPoint that hackers are using to seize control of computers. Computer World reports that the security problem affects all of the currently supported releases of Windows. 

TOPICS:
One should not expect to find all user information sitting in the default folder or default location for a given type of file (e.g. Application Data or similar folder). Searching the entire hard disk is required in order to locate all unencrypted log and

FAA Seeks App to Preserve Digital Evidence

October 23, 2014 12:01 pm | Comments

To help with the collection, management, protection and preservation of digital forensic evidence, the Federal Aviation Administration is turning to industry. In an Oct. 15 posting, the FAA said it's seeking a commercial off-the-shelf application that will create a remotely accessible depository where digital media analysts can store digital forensic evidence and distribute forensic workload among investigators.

TOPICS:
Your medical information is worth 10 times more than your credit card number on the black market. Security experts say cyber criminals are increasingly targeting the $3 trillion U.S. healthcare industry, which has many companies still reliant on aging com

US Investigating Cybersecurity Flaws in Medical Devices

October 23, 2014 11:52 am | Comments

The U.S. Department of Homeland Security is investigating about two dozen cases of suspected cybersecurity flaws in medical devices and hospital equipment that officials fear could be exploited by hackers, a senior official at the agency told Reuters.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading