Advertisement
News
Subscribe to DFI News

The Lead

Credit card fraud and identify theft are serious problems for consumers and industries. Though corporations and individuals work to improve safeguards, it has become increasingly difficult to protect financial data and personal information from criminal a

Quantum Physics Can Make Credit Cards Fraud-proof

December 17, 2014 | by The Optical Society | Comments

Credit card fraud and identify theft are serious problems for consumers and industries. Though corporations and individuals work to improve safeguards, it has become increasingly difficult to protect financial data and personal information from criminal activity. Fortunately, new insights into quantum physics may soon offer a solution.

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Dakota county is creating the first local Electronic Crimes Task Force based in Minnesota. Ten agencies — nine city police departments and the sheriff’s office — will participate in the group, which will begin operating next month.

Police Departments Join Forces, Bring Tech Analysis In-house

December 16, 2014 11:50 am | by Jessie Van Berkel, Star Tribune | Comments

Dakota county is creating the first local Electronic Crimes Task Force based in Minnesota. Ten agencies — nine city police departments and the sheriff’s office — will participate in the group, which will begin operating next month.     

TOPICS:
Google has blacklisted more than 11,000 domains involved in the latest malware campaign from SoakSoak.ru. But, the impact is apparently much larger: it seems to be affecting most hosts across the WordPress hosting spectrum, according to researchers.

Wordpress Sites Serving SoakSoak

December 16, 2014 11:34 am | by Tara Seals, Infosecurity Magazine | Comments

Google has blacklisted more than 11,000 domains involved in the latest malware campaign from SoakSoak.ru. But, the impact is apparently much larger: it seems to be affecting most hosts across the WordPress hosting spectrum, according to researchers.

TOPICS:
Criminal hackers are actively exploiting the critical shellshock vulnerability to install a self-replicating backdoor on a popular line of storage systems, researchers have warned.

Worm Exploits Shellshock to Take Over Network Storage Systems

December 16, 2014 11:20 am | by Dan Goodin, Ars Technica | Comments

Criminal hackers are actively exploiting the critical shellshock vulnerability to install a self-replicating backdoor on a popular line of storage systems, researchers have warned.                   

TOPICS:
Advertisement
Seventy-six percent of organizations in the U.S. and U.K. have suffered a DNS   attack, with 49 percent experiencing one in the past 12 months, according to   Cloudmark.

DNS Attacks Plunder Organizations

December 16, 2014 11:03 am | by Help Net Security | Comments

Seventy-six percent of organizations in the U.S. and U.K. have suffered a DNS attack, with 49 percent experiencing one in the past 12 months, according to Cloudmark.                        

TOPICS:
The Federal Bureau of Investigation has warned U.S. businesses to be on the alert for a sophisticated Iranian hacking operation whose targets include defense contractors, energy firms and educational institutions, according to a confidential agency docume

FBI Warns Iran Hackers May Target US Firms

December 15, 2014 11:42 am | by Jim Finkle, Reuters | Comments

The Federal Bureau of Investigation has warned U.S. businesses to be on the alert for a sophisticated Iranian hacking operation whose targets include defense contractors, energy firms and educational institutions, according to a confidential agency document.

TOPICS:
SiQuest was voted "Industry Innovator 2014" by SC Magazine under the category of Analysis and Testing for the evaluation and performance of their new Internet Examiner® Toolkit forensic software.

SiQuest Voted Industry Innovator 2014

December 15, 2014 11:27 am | SiQuest Corporation | Comments

SiQuest was voted "Industry Innovator 2014" by SC Magazine under the category of Analysis and Testing for the evaluation and performance of their new Internet Examiner® Toolkit forensic software.               

TOPICS:
Researchers from Universidad Carlos III de Madrid (UC3M) and the Universidad de Málaga (UMA) have collaborated with the consulting and technology company Indra on the development of a new advanced simulator of training in cybersecurity, a system that teac

New Simulator Provides Training in Cybersecurity

December 15, 2014 11:01 am | by Carlos III University of Madrid | Comments

Researchers from Universidad Carlos III de Madrid (UC3M) and the Universidad de Málaga (UMA) have collaborated with the consulting and technology company Indra on the development of a new advanced simulator of training in cybersecurity, a system that teaches users how to carry out computer forensics, prevent cyber attacks and learn techniques of cyber defense.

TOPICS:
Early on the chilly morning of February 10, just above the casino floor, the offices of the world’s largest gaming company were gripped by chaos. Computer engineers at Las Vegas Sands Corp. raced to figure out what was happening. Within an hour, they had

Iranian Hackers Appearing at Sands Casino

December 12, 2014 12:13 pm | by Ben Elgin and Michael Riley, Bloomberg Businessweek | Comments

Early on the chilly morning of February 10, just above the casino floor, the offices of the world’s largest gaming company were gripped by chaos. Computer engineers at Las Vegas Sands Corp. raced to figure out what was happening. Within an hour, they had a diagnosis: Sands was under a withering cyber attack.

TOPICS:
Advertisement
A sophisticated malware campaign that has compromised numerous industrial control systems (ICS) environments using a variant of the BlackEnergy malware appears to be targeting internet-connected human-machine interfaces (HMIs).

BlackEnergy Attacks Critical Infrastructure

December 12, 2014 11:39 am | by Tara Seals, Infosecurity Magazine | Comments

A sophisticated malware campaign that has compromised numerous industrial control systems (ICS) environments using a variant of the BlackEnergy malware appears to be targeting internet-connected human-machine interfaces (HMIs).       

TOPICS:
Phyllis Schneck's job as deputy undersecretary for cybersecurity at the Department of Homeland Security should get a bit easier when President Obama, as expected, signs FISMA reform legislation that passed Congress this week.

DHS Wins in Congressional Cybersecurity Vote

December 12, 2014 11:25 am | by Eric Chabrow, Gov Info Security | Comments

Phyllis Schneck's job as deputy undersecretary for cybersecurity at the Department of Homeland Security should get a bit easier when President Obama, as expected, signs FISMA reform legislation that passed Congress this week.       

TOPICS:
The UK Government is launching a Child Abuse Image Database. It is a landmark project for law enforcement. Never before has UK law enforcement had such a sophisticated method of sharing and matching critical case data, logging visual evidence and analyzin

UK Launching Child Abuse Image Database

December 12, 2014 11:05 am | Comments

The UK Government is launching a Child Abuse Image Database. It is a landmark project for law enforcement. Never before has UK law enforcement had such a sophisticated method of sharing and matching critical case data, logging visual evidence and analyzing digital media.

TOPICS:
A highly advanced, multi-layered advanced persistent threat (APT) is targeting individuals in strategic positions: Executives in important businesses such as oil, finance and engineering, military officers, embassy personnel and government officials. And

Advanced Inception APT Malware Likely State-sponsored

December 11, 2014 11:44 am | by Tara Seals, Infosecurity Magazine | Comments

A highly advanced, multi-layered advanced persistent threat (APT) is targeting individuals in strategic positions: Executives in important businesses such as oil, finance and engineering, military officers, embassy personnel and government officials. And it’s spreading.

TOPICS:
The studio behind the “Spider-Man” franchise and “The Social Network” has taken technological counter-measures to disrupt downloads of its most sensitive information, which were exposed when a hacking attack crippled its systems in late November.

Sony Tries to Disrupt Downloads of Stolen Files

December 11, 2014 11:26 am | by Dawn Chmielewski and Arik Hesseldahl, Re/Code | Comments

The studio behind the “Spider-Man” franchise and “The Social Network” has taken technological counter-measures to disrupt downloads of its most sensitive information, which were exposed when a hacking attack crippled its systems in late November.

TOPICS:
The Oakland police department and city websites were offline on Wednesday and   activist hackers from the Anonymous collective who threatened to take action   against law enforcement over the Bay Area demonstrations claimed responsibility   for the outage

Oakland Sites Down, Anonymous Hackers Claim Credit

December 11, 2014 11:08 am | by Daniel Wallis, Reuters | Comments

The Oakland police department and city websites were offline on Wednesday and activist hackers from the Anonymous collective who threatened to take action against law enforcement over the Bay Area demonstrations claimed responsibility for the outage.

TOPICS:
The pipeline was outfitted with sensors and cameras to monitor every step of its 1,099 miles from the Caspian Sea to the Mediterranean. The blast that blew it out of commission didn’t trigger a single distress signal. For western intelligence agencies, th

Turkey Pipeline Blast Opened New Cyberwar Era

December 11, 2014 10:16 am | by Jordan Robertson and Michael Riley, Bloomberg | Comments

The pipeline was outfitted with sensors and cameras to monitor every step of its 1,099 miles from the Caspian Sea to the Mediterranean. The blast that blew it out of commission didn’t trigger a single distress signal. For western intelligence agencies, the blowout was a watershed event. 

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading