Advertisement
News
Subscribe to DFI News

The Lead

It was May of 2012 at a security conference in Calgary, Alberta, when professor Ron Deibert heard a former high-ranking official suggest he should be prosecuted.

Inside Citizen Lab, the 'Hacker Hothouse'

July 31, 2014 | by Joshua Kopstein, Ars Technica | Comments

From exposing the espionage ring that hacked the Dalai Lama to uncovering the commercial spyware being sold to repressive regimes, Citizen Lab has played a pioneering role in combing the Internet to illuminate covert landscapes of global surveillance and censorship. At the same time, it's also taken the role of an ambassador, connecting the Internet's various stakeholders from governments to security engineers and civil rights activists.

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

A study from Webroot on security and PC gamers details the security   perspective of players on their gaming systems. The study indicates that many   gamers either disable their security or remove it altogether, thereby sacrificing protection to maximiz

PC Gaming Vulnerable against Online Threats

July 31, 2014 3:12 pm | by Webroot | Comments

A study from Webroot on security and PC gamers details the security perspective of players on their gaming systems. The study indicates that many gamers either disable their security or remove it altogether, thereby sacrificing protection to maximize system performance and leaving themselves vulnerable to gaming-focused malware and cyber attacks.

Researchers at Dell SecureWorks have uncovered what they believe to be a Chinese hacking group specifically focused on stealing source code from video game companies, either in order to crack or cheat at particular games or to use in competing products.

Chinese Hackers Use APTs to Target Gaming Companies

July 31, 2014 10:01 am | by Infosecurity | Comments

Researchers at Dell SecureWorks have uncovered what they believe to be a Chinese hacking group specifically focused on stealing source code from video game companies, either in order to crack or cheat at particular games or to use in competing products.

TOPICS:
Gathering and understanding cyber intelligence is the work of BlackForest, a new open source intelligence gathering system developed by information security specialists at the Georgia Tech Research Institute (GTRI). By using such information to create a t

Threat Information System Warns of Impending Cyber Attacks

July 31, 2014 9:46 am | by Georgia Institute of Technology | Comments

Gathering and understanding cyber intelligence is the work of BlackForest, a new open source intelligence gathering system developed by information security specialists at the Georgia Tech Research Institute (GTRI). By using such information to create a threat picture, BlackForest helps corporations, government agencies and nonprofit organizations battle increasingly-sophisticated threats to their networks.

TOPICS:
Advertisement

Feds Admit Cooperation Remains Obstacle with Corporations, Cyber Threats

July 31, 2014 9:26 am | by Tom Fontaine, Trib LIVE | Comments

A key to reducing cyber crime is getting victims — often major corporations — to cooperate with authorities, two top federal law enforcement officials said during visits to Pittsburgh.                   

TOPICS:
Officials with the Tor privacy service have uncovered an attack that may have revealed identifying information or other clues of people operating or accessing anonymous websites and other services over a five-month span beginning in February.

Tor Attack Tried to Uncover Users for Five Months

July 30, 2014 3:11 pm | by Dan Goodin, Ars Technica | Comments

Officials with the Tor privacy service have uncovered an attack that may have revealed identifying information or other clues of people operating or accessing anonymous websites and other services over a five-month span beginning in February. 

TOPICS:
If you’re making a phone call with your iPhone, you used to have two options: Accept the notion that any wiretapper, hacker or spook can listen in on your conversations, or pay for pricey voice encryption software. As of today there’s a third option.

iPhone App Makes Free, Encrypted Calls

July 30, 2014 9:55 am | by Andy Greenberg, Wired | Comments

If you’re making a phone call with your iPhone, you used to have two options: Accept the notion that any wiretapper, hacker or spook can listen in on your conversations, or pay for pricey voice encryption software. As of today there’s a third option.

TOPICS:
In an interview with former National Security Agency Director General Keith Alexander, Foreign Policy's Shane Harris learned that Alexander plans to file “at least” nine patent applications — “and possibly more" — pertaining to technology for detecting ne

Former NSA Director to File Cybersecurity Patents in the Private World

July 30, 2014 9:08 am | by Megan Guess, Ars Technica | Comments

In an interview with former National Security Agency Director General Keith Alexander, Foreign Policy's Shane Harris learned that Alexander plans to file “at least” nine patent applications — “and possibly more" — pertaining to technology for detecting network intruders.

TOPICS:
While the word “forensics” might conjure up images of collecting hair or fingerprints from crime scenes, the scope of forensic science extends beyond the physical into almost any realm. If you need to discover the weather patterns in the past, you need so

The Budding Science of Chatroom Forensics

July 29, 2014 4:34 pm | by Ben Richmond. Motherboard | Comments

While the word “forensics” might conjure up images of collecting hair or fingerprints from crime scenes, the scope of forensic science extends beyond the physical into almost any realm. If you need to discover the weather patterns in the past, you need some forensic meteorology. Forensic accounting uncovers book-cookery. And down in Australia, they're working on forensic text comparison in order to catch pedophiles.

TOPICS:
Advertisement
High-level Chinese hackers recently tried to break into a key Canadian computer system, forcing Ottawa to isolate it from the main government network, a senior official said on Tuesday.

Canada Says China Tried to Hack into Key Computer System

July 29, 2014 11:12 am | by Reuters | Comments

High-level Chinese hackers recently tried to break into a key Canadian computer system, forcing Ottawa to isolate it from the main government network, a senior official said on Tuesday.                   

TOPICS:
Federal Chief Information Security Officers (CISOs) and information security executives face a number of challenges in today's dynamic, fast-paced environment.

How to Build a Federal Information Security Team

July 29, 2014 10:01 am | by (ISC)2 Writers Bureau, Information Week | Comments

Federal Chief Information Security Officers (CISOs) and information security executives face a number of challenges in today's dynamic, fast-paced environment. These challenges include advanced persistent threats, system vulnerabilities, and regulatory compliance, to name a few.

TOPICS:
It has been over a year since The Guardian reported the first story on the National Security Agency’s surveillance programs based on the leaks from former NSA contractor Edward Snowden, yet the national conversation remains largely mired in a simplistic d

Surveillance Costs: The NSA's Impact on the Economy, Internet Freedom & Cybersecurity

July 29, 2014 9:42 am | by Danielle Kehl,Kevin Bankston,Robyn Greene,Robert Morgus,New America Foundation | Comments

It has been over a year since The Guardian reported the first story on the National Security Agency’s surveillance programs based on the leaks from former NSA contractor Edward Snowden, yet the national conversation remains largely mired in a simplistic debate over the tradeoffs between national security and individual privacy. It is time to start weighing the overall costs and benefits more broadly.

TOPICS:

Stalking Predators Online Stresses Cyber Cops

July 28, 2014 11:11 am | by Maya Lau, The Times | Comments

To string along suspected sex offenders, Bryan Montgomery carries out intimate conversations with them — sometimes lasting a year — while posing as a juvenile on social media. The job brings psychological stress, which Montgomery acknowledges. 

TOPICS:
The Russian Ministry of Internal Affairs (MVD) has offered a 3.9 million ruble (approximately $111,000) contract for technology that can identify the users of Tor, the encrypted anonymizing network used by Internet users seeking to hide their activities f

Russia Offers $111,000 Bounty to Break Tor Privacy

July 28, 2014 10:56 am | by Sean Gallagher, Ars Technica | Comments

The Russian Ministry of Internal Affairs (MVD) has offered a 3.9 million ruble (approximately $111,000) contract for technology that can identify the users of Tor, the encrypted anonymizing network used by Internet users seeking to hide their activities from monitoring by law enforcement, government censors, and others.

TOPICS:
SiQuest Corporation has added a feature to its Internet Examiner Toolkit (IXTK). With the current release of Version 4.0.1407.2503, IXTK now forensically recovers evidence of “watched YouTube videos” from the Unallocated Space and browser cache repositori

Software Forensically Recovers Watched YouTube Videos

July 28, 2014 10:32 am | by John Bradley | SiQuest Corporation | Comments

SiQuest Corporation has added a feature to its Internet Examiner Toolkit (IXTK). With the current release of Version 4.0.1407.2503, IXTK now forensically recovers evidence of “watched YouTube videos” from the Unallocated Space and browser cache repositories of computer hard drives, and the YouTube website directly.

TOPICS:
The prospect that classified capabilities could be revealed in a criminal case has meant that the most sophisticated surveillance technologies are not always available to law enforcement because they are classified, current and former.

How Spy Agencies Keep Their 'Toys' from Law Enforcement

July 28, 2014 10:05 am | by Ellen Nakashima, The Washington Post | Comments

The prospect that classified capabilities could be revealed in a criminal case has meant that the most sophisticated surveillance technologies are not always available to law enforcement because they are classified, current and former.    

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading