Advertisement
News
Subscribe to DFI News

The Lead

Mere days after a government crackdown on a spyware manufacturer comes the startling revelation that law enforcement agencies have been purchasing commercial spyware themselves and handing it out to the public for free.

Police are Handing Out Spyware to Parents

October 2, 2014 | by Kim Zetter, Wired | Comments

Mere days after a government crackdown on a spyware manufacturer comes the startling revelation that law enforcement agencies have been purchasing commercial spyware themselves and handing it out to the public for free.         

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

The National Institute of Standards and Technology (NIST) has published its NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0, a document that reflects advances in smart grid technologies and developments from NIST’s collab

NIST Releases Final Version of Smart Grid Framework, Update 3.0

October 2, 2014 9:25 am | by NIST | Comments

The National Institute of Standards and Technology (NIST) has published its NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0, a document that reflects advances in smart grid technologies and developments from NIST’s collaborative work with industry stakeholders. Revisions to its guidelines for smart grid cybersecurity are available as well.

TOPICS:
President Vladimir Putin said on Wednesday he would not consider restricting Internet access for Russian users but warned of a sharp rise in cyber attacks on state domains since the Ukraine crisis began.

Putin Won't Curb Internet Access despite Cyber Attacks

October 1, 2014 10:35 am | by Reuters | Comments

President Vladimir Putin said on Wednesday he would not consider restricting Internet access for Russian users but warned of a sharp rise in cyber attacks on state domains since the Ukraine crisis began.             

TOPICS:
Viruses and worms have each had their day in the spotlight. Remote-access Trojans, which allow a hacker to open and maintain a secret backdoor on infected systems, have had their reign as well. These days, though, point-of-sale RAM scrapers are what’s mak

The Sneaky Tools Behind the Latest Credit Card Hacks

October 1, 2014 10:26 am | by Kim Zetter, Wired | Comments

Viruses and worms have each had their day in the spotlight. Remote-access Trojans, which allow a hacker to open and maintain a secret backdoor on infected systems, have had their reign as well. These days, though, point-of-sale RAM scrapers are what’s making the news.

TOPICS:
Advertisement
US Attorney General Eric Holder has become the latest senior official to argue against stronger privacy enhancing encryption on smartphones, claiming it has emboldened online criminals and child abusers.

Attorney General Slams Strong Phone Encryption

October 1, 2014 10:03 am | by Phil Muncaster, Infosecurity Magazine | Comments

US Attorney General Eric Holder has become the latest senior official to argue against stronger privacy enhancing encryption on smartphones, claiming it has emboldened online criminals and child abusers.             

TOPICS:
Four members of an international computer hacking ring have been charged with breaking into computer networks of prominent technology companies and the U.S. Army and stealing more than $100 million in intellectual property and other proprietary data.

Four Hackers Indicted for Stealing Gaming Technology, Army Software

October 1, 2014 9:41 am | by DoJ | Comments

Four members of an international computer hacking ring have been charged with breaking into computer networks of prominent technology companies and the U.S. Army and stealing more than $100 million in intellectual property and other proprietary data.

TOPICS:
The distinction between real-world crime and cyber crime is becoming increasingly blurred. In the past, thieves, robbers and fraudsters would rely on knives and guns to get the job done; today they are more likely to use phishing scams, denial-of-service

Traditional Crime is Coming to Cyberspace

September 30, 2014 11:20 am | by Sophie Curtis, The Telegraph | Comments

The distinction between real-world crime and cyber crime is becoming increasingly blurred. In the past, thieves, robbers and fraudsters would rely on knives and guns to get the job done; today they are more likely to use phishing scams, denial-of-service attacks and trojans.

TOPICS:
Card data of Supervalu and Albertsons shoppers may be at risk in another hack. The companies said that in late August or early September, malicious software was installed on networks that process credit and debit card transactions at some of their stores.

Another Card System Hack at Supervalu, Albertsons

September 30, 2014 10:53 am | by Associated Press | Comments

Card data of Supervalu and Albertsons shoppers may be at risk in another hack. The companies said that in late August or early September, malicious software was installed on networks that process credit and debit card transactions at some of their stores.

TOPICS:
A Pakistani man has been indicted in the Eastern District of Virginia for allegedly conspiring to advertise and sell StealthGenie, a spyware application (app) that could monitor calls, texts, videos and other communications on mobile phones without detect

Pakistani Man Indicted for Selling Spyware App

September 30, 2014 10:25 am | by DoJ | Comments

A Pakistani man has been indicted in the Eastern District of Virginia for allegedly conspiring to advertise and sell StealthGenie, a spyware application (app) that could monitor calls, texts, videos and other communications on mobile phones without detection. This marks the first-ever criminal case concerning the advertisement and sale of a mobile device spyware app.  

TOPICS:
Advertisement
Days after GM announced the appointment of a chief security officer, automotive cybersecurity has gotten another boost with a $4 million Series A funding shot for car-focused Argus Cyber Security.

Investors Drive into Car Cybersecurity

September 30, 2014 10:06 am | by Tara Seals, Infosecurity Magazine | Comments

Days after GM announced the appointment of a chief security officer, automotive cybersecurity has gotten another boost with a $4 million Series A funding shot for car-focused Argus Cyber Security.               

TOPICS:
Apple has finally released a security update for OS X that will close up the critical remote code execution Shellshock bug found in the GNU Bash UNIX shell.

Apple Patches Shellshock Bug in OS X

September 30, 2014 9:51 am | by Zeljka Zorz, Help Net Security | Comments

Apple has finally released a security update for OS X that will close up the critical remote code execution Shellshock bug found in the GNU Bash UNIX shell.                           

TOPICS:
Security experts are urging firms to patch the Shellshock bug as soon as possible, after spotting a “significant amount” of malicious traffic exploiting the Bash vulnerability made public recently.

Malicious Shellshock Traffic Invades the Web

September 29, 2014 10:28 am | by Phil Muncaster, Infosecurity Magazine | Comments

Security experts are urging firms to patch the Shellshock bug as soon as possible, after spotting a “significant amount” of malicious traffic exploiting the Bash vulnerability made public recently.               

TOPICS:
Disgruntled workers are increasingly exacting their revenge on their employers by using their access to company computers to engage in cyber sabotage, the FBI is warning. Others are using their access to extort money from their employers by threatening sa

FBI Warns of Rising Cyber Sabotage, Extortion by Disgruntled Employees

September 29, 2014 10:05 am | by Sean Higgins, Washington Examiner | Comments

Disgruntled workers are increasingly exacting their revenge on their employers by using their access to company computers to engage in cyber sabotage, the FBI is warning. Others are using their access to extort money from their employers by threatening sabotage.

TOPICS:

Organized Crime Opting for Hidden Internet Service Industry

September 29, 2014 9:51 am | by Europol | Comments

The 2014 iOCTA (Internet Organised Crime Threat Assessment), published by Europol's European Cybercrime Centre (EC3), describes an increased commercialization of cyber crime. A service-based criminal industry is developing, in which specialists in the virtual underground economy develop products and services for use by other criminals. 

TOPICS:
The US financial services industry is finally getting tough on cybercrime, with the announcement of a new body to be tasked with developing threat intelligence products.

US Banks Get Serious about Security Information Sharing

September 26, 2014 10:40 am | by Phil Muncaster, Infosecurity Magazine | Comments

The US financial services industry is finally getting tough on cyber crime, with the announcement of a new body to be tasked with developing threat intelligence products.                       

TOPICS:
FBI Director James B. Comey sharply criticized Apple and Google recently for developing forms of smartphone encryption so secure that law enforcement officials cannot easily gain access to information stored on the devices — even when they have valid sear

FBI Blasts Apple, Google for Blocking Phones from Police Investigation

September 26, 2014 10:13 am | by Craig Timberg and Greg Miller, The Washington Post | Comments

FBI Director James B. Comey sharply criticized Apple and Google recently for developing forms of smartphone encryption so secure that law enforcement officials cannot easily gain access to information stored on the devices — even when they have valid search warrants.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading