Advertisement
News
Subscribe to DFI News

The Lead

A small cybersecurity firm claimed this summer to have uncovered a scam by Russian Internet thieves to amass a mountain of stolen information from420,000 Web and FTP sites. Although a New York Times story lent credibility to the claims, some observers que

Crime Ring Revelation Exposes Cybersecurity Conflict of Interest

September 16, 2014 | by Erik Schechter, Scientific American | Comments

A small cybersecurity firm claimed this summer to have uncovered a scam by Russian Internet thieves to amass a mountain of stolen information from 420,000 Web and FTP sites. Although a New York Times story lent credibility to the claims, some observers question whether the cybersecurity vendor’s big reveal was more of a publicity stunt than a public service. 

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

There are many ways bad guys attack systems, disrupt infrastructures and steal data, but one of the most common uses an entry point that is vital to Internet communications and yet, it seems, carelessly disregarded: the humble, but crucial, SSL.

SSL Remains Security Weakness Despite Latest Reinforcements

September 15, 2014 11:01 am | by Brian Robinson | Comments

There are many ways bad guys attack systems, disrupt infrastructures and steal data, but one of the most common uses an entry point that is vital to Internet communications and yet, it seems, carelessly disregarded: the humble, but crucial, SSL.

TOPICS:
Matt Weeks, one of the developers who contributes code to the open source Metasploit Project, has published a long report detailing how he was able to reverse-engineer the encrypted communications protocol used by Ammyy Admin, one of the most popular remo

Turning the Tables on Tech Support Scammers

September 15, 2014 10:43 am | by Lee Hutchinson, Ars Technica | Comments

Matt Weeks, one of the developers who contributes code to the open source Metasploit Project, has published a long report detailing how he was able to reverse-engineer the encrypted communications protocol used by Ammyy Admin, one of the most popular remote control apps used by tech support scammers, and then use that knowledge to ferret out a vulnerability in the Ammyy Admin application.

TOPICS:
The NSA has allegedly infiltrated the internal networks of two German telcos as part of an ambitious project to map the entire internet in real-time, according to the latest revelations from whistleblower Edward Snowden.

NSA Maps the Internet with German Telecoms

September 15, 2014 10:25 am | by Phil Muncaster, Infosecurity Magazine | Comments

The NSA has allegedly infiltrated the internal networks of two German telcos as part of an ambitious project to map the entire internet in real-time, according to the latest revelations from whistleblower Edward Snowden.         

TOPICS:
Advertisement
The headache caused by the attack on JPMorgan Chase’s computer network this summer may not go away anytime soon. Over two months, hackers gained entry to dozens of the bank’s servers, potentially giving the hackers a window into how the bank’s individual

JPMorgan Still Investigating Attack

September 15, 2014 10:13 am | by Nicole Perlroth and Matthew Goldstein, The New York Times | Comments

The headache caused by the attack on JPMorgan Chase’s computer network this summer may not go away anytime soon. Over two months, hackers gained entry to dozens of the bank’s servers, potentially giving the hackers a window into how the bank’s individual computers work.

TOPICS:
Silent Shield has sponsored the first Digital Crime Scene Challenge at the 26th Annual Crimes Against Children Conference (CACC). Internationally recognized, the CACC is the premier conference of its kind providing practical and interactive instruction to

Silent Shield Sponsors First Digital Crime Scene Challenge at 26th Annual Crimes Against Children Conference

September 12, 2014 5:00 pm | by Silent Shield | Comments

Silent Shield has sponsored the first Digital Crime Scene Challenge at the 26th Annual Crimes Against Children Conference (CACC). Internationally recognized, the CACC is the premier conference of its kind providing practical and interactive instruction to those fighting crimes against children and helping children heal.

TOPICS:
Every sector of the United States government has likely been hacked at some point, according to the FBI, which has lent to “unprecedented” partnerships with private industry to protect financial interests targeted by “a wide range of cyber adversaries.”

FBI: Relentless Hacking behind Govt-industry Collaboration

September 12, 2014 12:20 pm | by RT | Comments

Every sector of the United States government has likely been hacked at some point, according to the FBI, which has lent to “unprecedented” partnerships with private industry to protect financial interests targeted by “a wide range of cyber adversaries.”

TOPICS:
US government requests for access to Dropbox user content and account details rose in line with subscriber numbers over the first half of 2014, but several of the accounts requested didn’t actually exist, according to the firm.

US Government Requests Access to Non-existent Dropbox Accounts

September 12, 2014 11:52 am | by Phil Muncaster, Infosecurity Magazine | Comments

US government requests for access to Dropbox user content and account details rose in line with subscriber numbers over the first half of 2014, but several of the accounts requested didn’t actually exist, according to the firm.       

TOPICS:
Yahoo says the government threatened to fine the company $250,000 a day if it did not comply with demands to go along with an expansion of U.S. surveillance by surrendering online information, a step the company regarded as unconstitutional. The outlines

Yahoo Threatened with $250,000-a-day Fine for Withholding Info

September 12, 2014 10:52 am | Comments

Yahoo says the government threatened to fine the company $250,000 a day if it did not comply with demands to go along with an expansion of U.S. surveillance by surrendering online information, a step the company regarded as unconstitutional. The outlines of Yahoo's secret and ultimately unsuccessful court fight against government surveillance emerged when a federal judge ordered the unsealing of some material about Yahoo's court challenge.

TOPICS:
Advertisement
Online Black Markets Evolve Since Silk Road's Downfall

Online Black Markets Evolve Since Silk Road's Downfall

September 11, 2014 12:05 pm | by Andy Greenberg, Wired | Comments

When the FBI tore down the billion-dollar drugs-and-contraband website Silk Road last October, its death made room for a new generation of black-market bazaars — many with better defenses against the Feds. Nearly a year later, more drugs are sold online than when the Silk Road ruled the dark web.

TOPICS:

Large ISP Fights DDoS Attacks

September 11, 2014 11:55 am | by Mirko Zorz, Help Net Security | Comments

DDoS attacks are a growing problem. In July, Arbor Networks released global DDoS attack data derived from its ATLAS threat monitoring infrastructure that shows a surge in volumetric attacks in the first half of 2014 with over 100 attacks larger than 100GB/sec reported.

TOPICS:

​Five Million 'Compromised' Google Accounts Leaked

September 11, 2014 10:30 am | by RT | Comments

A database of what appears to be some five million login and password pairs for Google accounts has been leaked to a Russian cyber security internet forum. It follows similar leaks of account data for popular Russian web services.     

TOPICS:
In light of one high profile "hack," is it fair to primarily blame Apple's current security setup? Is it really that easy to penetrate these defenses? In the name of security, we did a little testing using family members as guinea pigs. To demonstrate jus

How easy is it to mine Apple services, devices for data?

September 11, 2014 10:13 am | by Sean Gallagher, Ars Technica | Comments

In light of one high profile "hack," is it fair to primarily blame Apple's current security setup? Is it really that easy to penetrate these defenses? In the name of security, we did a little testing using family members as guinea pigs. To demonstrate just how much private information on an iPhone can be currently pulled from iCloud and other sources, we enlisted the help of a pair of software tools from Elcomsoft. 

TOPICS:
Through the Department of Homeland Security’s Transition to Practice (TTP) program, cybersecurity technologies developed at Sandia National Laboratories — and at other federal labs — now stand a better chance of finding their way into the real world.

Cyber Testing Contributes to DHS Transition to Practice

September 11, 2014 8:17 am | by Sandia National Laboratories | Comments

Through the Department of Homeland Security’s Transition to Practice (TTP) program, cybersecurity technologies developed at Sandia National Laboratories — and at other federal labs — now stand a better chance of finding their way into the real world.

TOPICS:

Home Depot Sued by Customer over Data Breach

September 10, 2014 11:10 am | by Reuters | Comments

Home improvement retailer Home Depot Inc (HD.N) has been sued over data breach by a customer, saying the company failed to properly safeguard customer data from hackers, a lawsuit filed in a Chicago federal court showed on Tuesday.     

TOPICS:
Microsoft has urged US District Judge Loretta Preska, the judge presiding over the case that sees the company refusing to hand some emails stored in its Dublin facility over to the US government, to find them in contempt.

Microsoft Refuses to Hand Over Emails, Held in Contempt

September 10, 2014 10:56 am | by Zeljka Zorz, Help Net Security | Comments

Microsoft has urged US District Judge Loretta Preska, the judge presiding over the case that sees the company refusing to hand some emails stored in its Dublin facility over to the US government, to find them in contempt.        

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading