Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

CCL will be demonstrating the social media monitoring tool Signal at the UK’s first international social media law enforcement conference.

CCL to Showcase Social Media Tools for Law Enforcement at Smile Conference

August 20, 2014 8:08 am | CCL-Forensics Limited | Comments

CCL will be demonstrating the social media monitoring tool Signal at the UK’s first international social media law enforcement conference.                               

TOPICS:
The new digital forensics program at the University at Albany is designed to educate and prepare students to work in a fast-growing, billion-dollar market with high, long-term projected demand for trained professionals.

Digital Forensics Program Prepares Students to Tackle Cyber Crime

August 20, 2014 8:07 am | by Univ. of Albany | Comments

The new digital forensics program at the University at Albany is designed to educate and prepare students to work in a fast-growing, billion-dollar market with high, long-term projected demand for trained professionals.         

TOPICS:
Community Health Systems, one of the biggest U.S. hospital groups, said on Monday it was the victim of a cyber attack from China, resulting in the theft of Social Security numbers and other personal data belonging to 4.5 million patients.

Community Health Data Stolen in Cyber Attack from China

August 19, 2014 11:08 am | by Jim Finkle and Caroline Humer, Reuters | Comments

Community Health Systems, one of the biggest U.S. hospital groups, said on Monday it was the victim of a cyber attack from China, resulting in the theft of Social Security numbers and other personal data belonging to 4.5 million patients.   

TOPICS:
Advertisement
Nuclear Regulatory Commission computers within the past three years were successfully hacked by foreigners twice and also by an unidentifiable individual, according to an internal investigation.

Nuclear Regulator Hacked by Suspected Foreign Powers

August 19, 2014 10:37 am | by Aliya Sternstein, Nextgov | Comments

Nuclear Regulatory Commission computers within the past three years were successfully hacked by foreigners twice and also by an unidentifiable individual, according to an internal investigation.               

TOPICS:
Discussions of what government should do about the state of poor cyber defenses tend to focus on some kind of change in the law to raise regulations and/or lower liabilities. That is well and good, but government should also think about building a new org

A CDC for Cyber Crime

August 19, 2014 10:23 am | by Peter Singer, Wired | Comments

Discussions of what government should do about the state of poor cyber defenses tend to focus on some kind of change in the law to raise regulations and/or lower liabilities. That is well and good, but government should also think about building a new organization for the cyber age. And it can do so by taking inspiration from one of the most successful agencies created in the past.

TOPICS:
There are striking similarities between a crime scene investigation and cybercrime forensics. With IBM reporting 1.5 million U.S. cyber attacks monitored in 2013, IT and security professionals can take a few tips from law enforcement about securing, asses

Cyber Forensics: Taking Tips from a Detective's Playbook

August 18, 2014 3:50 pm | by Jayne Friedland Holland, GSN Magazine | Comments

There are striking similarities between a crime scene investigation and cybercrime forensics. With IBM reporting 1.5 million U.S. cyber attacks monitored in 2013, IT and security professionals can take a few tips from law enforcement about securing, assessing and reporting at a cyberattack crime scene.

TOPICS:
Cybersecurity experts raise doubts whether the National Security Agency has successfully deployed an automated hack-back system known as MonsterMind, as revealed by former NSA contractor Edward Snowden in an interview with Wired.

Experts Raise Doubts about MonsterMind

August 18, 2014 10:23 am | by Eric Chabrow, Gov Info Security | Comments

Cybersecurity experts raise doubts whether the National Security Agency has successfully deployed an automated hack-back system known as MonsterMind, as revealed by former NSA contractor Edward Snowden in an interview with Wired.     

TOPICS:
Security researchers have uncovered evidence of escalating cyber attacks emanating from Syria which use tried and tested techniques to download remote access trojans (RATs) onto victim PCs.

Syrian Hackers Ramp Up RAT Attacks

August 18, 2014 10:07 am | by Phil Muncaster, Infosecurity Magazine | Comments

Security researchers have uncovered evidence of escalating cyber attacks emanating from Syria which use tried and tested techniques to download remote access trojans (RATs) onto victim PCs.                 

TOPICS:
Advertisement

German Spies Capture Kerry, Clinton Conversations

August 18, 2014 9:40 am | by Michael Nienaber, Reuters | Comments

Germany's foreign intelligence agency recorded at least one phone conversation held by U.S. Secretary of State John Kerry, a German magazine said on Saturday, potentially embarrassing Berlin which has reprimanded Washington for its surveillance.

TOPICS:
A group of journalists has reported the existence of the "Hacienda" spy program. According to this report, five western intelligence agencies are using the Hacienda software to identify vulnerable servers across the world in order to control them and use

Researchers Develop Defense Software 'TCP Stealth'

August 18, 2014 9:00 am | by TUM | Comments

A group of journalists has reported the existence of the "Hacienda" spy program. According to this report, five western intelligence agencies are using the Hacienda software to identify vulnerable servers across the world in order to control them and use them for their own purposes. Scientists have developed free software that can help prevent this kind of identification and thus the subsequent capture of systems.

TOPICS:
The FBI's premier cybersquad has focused attention on computer-based crime in recent months by helping prosecutors charge five Chinese army intelligence officials with stealing trade secrets from major companies and by snaring a Russian-led hacking ring t

Premier FBI Cybersquad in Pittsburgh to Add Agents

August 18, 2014 8:46 am | by Joe Mandak, Associated Press | Comments

The FBI's premier cybersquad has focused attention on computer-based crime in recent months by helping prosecutors charge five Chinese army intelligence officials with stealing trade secrets from major companies and by snaring a Russian-led hacking ring that pilfered $100 million from bank accounts worldwide.

TOPICS:

Cybersecurity Remains a Gray Area for NATO

August 15, 2014 11:41 am | by Tom Risen, U.S. News & World Report | Comments

The North Atlantic Treaty Organization is expected to update its charter in September to address cybersecurity while leaving open the question of whether hacks count as an attack on its member states that could start a war. Leaving the definition open could cool fears about whether hackers could start a war.

TOPICS:

Mathematical Obfuscation against Hackers is Focus of New Cybersecurity Center

August 15, 2014 11:21 am | by Jeremy Hsu, IEEE Spectrum | Comments

Turning computer code into a kind of math puzzle may hold the key to protecting software from hackers. A consortium of universities developing the idea, called mathematical obfuscation, recently received a $5 million grant from the U.S. government as part of a broader cybersecurity initiative.

TOPICS:
Secure Channels Inc. has announced that none of the 155 hackers at the recent Black Hat USA 2014 Conference in Las Vegas who participated in a “Can You Break This” contest were able to hack the company’s new patented PKMS2 Encryption Technology.

Black Hat Hackers Fail to Crack Encryption Tech

August 15, 2014 11:02 am | by Secure Channels Inc. | Comments

Secure Channels Inc. has announced that none of the 155 hackers at the recent Black Hat USA 2014 Conference in Las Vegas who participated in a “Can You Break This” contest were able to hack the company’s new patented PKMS2 Encryption Technology.

TOPICS:
Mixing upper and lower case letters, numbers and special characters doesn’t make passwords any harder for hackers to crack, only increasing the number of characters does, according to new research from Trustwave.

Longer Passwords are Harder to Crack

August 15, 2014 10:36 am | by Phil Muncaster, Infosecurity Magazine | Comments

Mixing upper and lower case letters, numbers and special characters doesn’t make passwords any harder for hackers to crack, only increasing the number of characters does, according to new research from Trustwave.           

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading