Advertisement
News
Subscribe to DFI News

The Lead

As the acting cybersecurity chief of a federal agency, Timothy DeFoggi should have been well versed in the digital footprints users leave behind online when they visit web sites and download images. But he must have believed his use of the Tor anonymizing

Federal Cybersecurity Director Found Guilty on Child Porn Charges

August 27, 2014 | by Kim Zetter, Wired | Comments

As the acting cybersecurity chief of a federal agency, Timothy DeFoggi should have been well versed in the digital footprints users leave behind online when they visit web sites and download images. But he must have believed his use of the Tor anonymizing network shielded him from federal investigators.

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

According to newly published documents, the National Security Agency has built a “Google-like” search interface for its vast database of metadata, and the agency shares it with dozens of other American intelligence agencies. The new documents are part of

NSA Increases Interagency Cooperation with Own Search Engine

August 26, 2014 11:00 am | by Cyrus Farivar. Ars Technica | Comments

According to newly published documents, the National Security Agency has built a “Google-like” search interface for its vast database of metadata, and the agency shares it with dozens of other American intelligence agencies. The new documents are part of the Snowden leaks and were first published on by The Intercept.

TOPICS:
Even before the academic semester starts, students from across the globe have begun registering for the largest set of student cybersecurity competitions in the world: the NYU Polytechnic School of Engineering Cyber Security Awareness Week (CSAW).

NYU Launches Largest Cybersecurity Student Contests

August 26, 2014 10:04 am | by NYU Polytechnic School of Engineering | Comments

Even before the academic semester starts, students from across the globe have begun registering for the largest set of student cybersecurity competitions in the world: the NYU Polytechnic School of Engineering Cyber Security Awareness Week (CSAW).

TOPICS:
Six months ago, NIST released version 1.0 of its voluntary Framework for Improving Critical Infrastructure Cybersecurity. The framework was developed with industry in a collaborative and open process over the course of a year, as directed by President Oba

NIST Seeks Info on User Experiences with Cybersecurity Framework

August 26, 2014 9:54 am | by NIST | Comments

Six months ago, NIST released version 1.0 of its voluntary Framework for Improving Critical Infrastructure Cybersecurity. The framework was developed with industry in a collaborative and open process over the course of a year, as directed by President Obama in Executive Order 13636. NIST is now seeking public feedback on the framework.

TOPICS:
Advertisement
A cyber attack at a firm that performs background checks for U.S. government employees compromised data of at least 25,000 workers, including some undercover investigators, and that number could rise, agency officials say.

US Undercover Investigators among Those Exposed in Data Breach

August 25, 2014 11:20 am | by Jim Finkle and Mark Hosenball, Reuters | Comments

A cyber attack at a firm that performs background checks for U.S. government employees compromised data of at least 25,000 workers, including some undercover investigators, and that number could rise, agency officials say.       

TOPICS:
The video of James Foley’s execution may have been staged, with the actual   murder taking place off-camera, it has emerged. Forensic analysis of the   footage of the journalist’s death has suggested that the British jihadist in   the film may have been t

Foley Murder Video 'May Have been Staged'

August 25, 2014 10:29 am | by Bill Gardner, The Telegraph | Comments

The video of James Foley’s execution may have been staged, with the actual murder taking place off-camera, it has emerged. Forensic analysis of the footage of the journalist’s death has suggested that the British jihadist in the film may have been the frontman rather than the killer.

TOPICS:
A team of researchers have identified a weakness believed to exist in Android, Windows and iOS mobile operating systems that could be used to obtain personal information from unsuspecting users. They demonstrated the hack in an Android phone.

Mobile OS Weakness Allows Apps to Steal Personal Information

August 25, 2014 9:47 am | by Sean Nealon, Univ. of California - Riverside | Comments

A team of researchers have identified a weakness believed to exist in Android, Windows and iOS mobile operating systems that could be used to obtain personal information from unsuspecting users. They demonstrated the hack in an Android phone.  

TOPICS:
Researchers from Tel Aviv University have demonstrated an attack against the GnuPG encryption software that enables them to retrieve decryption keys by touching exposed metal parts of laptop computers.

Stealing Encryption Keys through the Power of Touch

August 22, 2014 10:47 am | by Peter Bright, Ars Technica | Comments

Researchers from Tel Aviv University have demonstrated an attack against the GnuPG encryption software that enables them to retrieve decryption keys by touching exposed metal parts of laptop computers.             

TOPICS:
When APTs (Advanced Persistent Threats) are discovered, network security operations professionals are instantly under pressure to explain and resolve the problems swiftly. Without a robust understanding of the context, network traffic and content, SecOps

Know Your Advanced Persistent Threats' Unknowns

August 22, 2014 10:26 am | by Information Buzz Security | Comments

When APTs (Advanced Persistent Threats) are discovered, network security operations professionals are instantly under pressure to explain and resolve the problems swiftly. Without a robust understanding of the context, network traffic and content, SecOps professionals are often left to rely on informed guesses and not verifiable facts.

TOPICS:
Advertisement
The majority of cyber attacks on northern European targets come from machines in Russia, while China is the number one source of threats aimed at the US, according to new honeypot data collected by Alert Logic.

Europe Bombarded with Cyber Attacks from Russia

August 22, 2014 10:22 am | by Phil Muncaster, Infosecurity Magazine | Comments

The majority of cyber attacks on northern European targets come from machines in Russia, while China is the number one source of threats aimed at the US, according to new honeypot data collected by Alert Logic.           

TOPICS:

Digital Clues Leading the Hunt for ISIS Killer

August 22, 2014 9:52 am | by Jill Lawless, Associated Press | Comments

The Islamic militant in a video showing the death of American journalist James Foley took great care to disguise his identity, dressing head-to-toe in black, with a mask leaving only his eyes visible. But police and intelligence services in Britain and the United States have a plethora of clues as they scramble to identify him, from image analysis and voice-recognition software to social media postings and testimony from former captives.

TOPICS:
A security researcher has announced that the notorious OpenSSL bug, Heartbleed, was the initial point of entry for the attack on Community Health Systems (CHS) that netted 4.5 million identity records — but other researchers point out that Heartbleed is o

Heartbleed Not Only Reason for Health Systems Breach

August 21, 2014 10:51 am | by Sara Peters, Dark Reading | Comments

A security researcher has announced that the notorious OpenSSL bug, Heartbleed, was the initial point of entry for the attack on Community Health Systems (CHS) that netted 4.5 million identity records — but other researchers point out that Heartbleed is only the beginning of the problem.

TOPICS:
Computer security researchers TU Darmstadt/CASED in Germany and North Carolina State University in USA have developed a modification to the core Android operating system that allows developers and users to plug in new security enhancements. The new Androi

Researchers Develop Framework to Facilitate New Android Security Modules

August 21, 2014 10:41 am | by CASED | Comments

Computer security researchers from TU Darmstadt/CASED in Germany and North Carolina State University in USA have developed a modification to the core Android operating system that allows developers and users to plug in new security enhancements. The new Android Security Modules (ASM) framework aims to eliminate the bottleneck that prevents developers and users from taking advantage of new security tools.

TOPICS:
Man-in-the-middle (MITM) attacks are “wreaking havoc” on Android users because over two-thirds of the most popular apps on Google Play contain SSL vulnerabilities, according to new research from FireEye.

SSL Vulnerabilities Found in Most Popular Android Apps

August 21, 2014 10:22 am | by Infosecurity Magazine | Comments

Man-in-the-middle (MITM) attacks are “wreaking havoc” on Android users because over two-thirds of the most popular apps on Google Play contain SSL vulnerabilities, according to new research from FireEye.             

TOPICS:

FBI Warns Healthcare Firms They are Targeted by Hackers

August 21, 2014 10:03 am | by Jim Finkle, Reuters | Comments

The FBI has warned that healthcare industry companies are being targeted by hackers, publicizing the issue following an attack on U.S. hospital group Community Health Systems Inc that resulted in the theft of millions of patient records.   

TOPICS:
Dealing with insider threats, as in dealing with any threat to your network, requires a plan for incident response. An effective response includes forensics, and forensics and storage go hand in hand. With the window of time between a compromise and its d

Incident Response Requires Forensics and Storage

August 21, 2014 9:49 am | by William Jackson, GCN | Comments

Dealing with insider threats, as in dealing with any threat to your network, requires a plan for incident response. An effective response includes forensics, and forensics and storage go hand in hand. With the window of time between a compromise and its discovery widening, the amount of storage needed to accommodate data is becoming greater.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading