Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Across the nation, private foundations are increasingly being tapped to provide police with technology and weaponry that — were it purchased with public money — would come under far closer scrutiny.

Private Donors Supply Spy Gear to Police

October 16, 2014 9:57 am | by Ali Winston and Darwin Bond Graham, ProPublica | Comments

Across the nation, private foundations are increasingly being tapped to provide police with technology and weaponry that — were it purchased with public money — would come under far closer scrutiny.         

TOPICS:
It’s easy to see how forensics used during a cyberattack investigation are similar to those used in a physical crime scene.

Crime Scene Mistakes Can Sink a Digital Forensic Investigation

October 16, 2014 9:33 am | by Jayne Friedland Holland, GCN | Comments

It’s easy to see how forensics used during a cyberattack investigation are similar to those used in a physical crime scene.                                    

TOPICS:
The sophisticated electronic components that are making modern cars safer, greener, and smarter are also making them dangerously vulnerable to cyber attacks.

Connected Cars Tough Fight with Cyber Crime

October 15, 2014 12:23 pm | by Jai Vijayan, Information Week | Comments

The sophisticated electronic components that are making modern cars safer, greener, and smarter are also making them dangerously vulnerable to cyber attacks.                           

TOPICS:
Advertisement
Digital forensics firm Cellebright has moved from copying contacts on mobile phones to digital forensics, helping police collar the bad guys along the way.

Company Gets Smartphones to Rat Out Criminal Owners

October 15, 2014 12:09 pm | by Niv Lilien, ZDNet | Cellebrite USA, Inc. | Comments

Digital forensics firm Cellebright has moved from copying contacts on mobile phones to digital forensics, helping police collar the bad guys along the way.                           

TOPICS:
In an interview with ISMG, Garet Moravec, an independent security consultant, offers a hypothetical example of thwarting Chinese hackers trying to breach a defense contractor's systems to pilfer designs on a jet fighter by using a honeypot, a trap contain

Hackers Manipulated as Advanced Threat Response

October 15, 2014 11:09 am | by Eric Chabrow, Gov Info Security | Comments

In an interview with ISMG, Garet Moravec, an independent security consultant, offers a hypothetical example of thwarting Chinese hackers trying to breach a defense contractor's systems to pilfer designs on a jet fighter by using a honeypot, a trap containing fake information that's designed to look like part of a network.

TOPICS:

Social Media No Help in Bank's Cyber Crime Fight

October 15, 2014 10:47 am | by Steve Slater, Reuters | Comments

Banks are fighting an uphill battle to protect themselves and their client accounts from cyber attacks, and the sometimes careless use of social media by customers and staff isn't making the fight any easier.           

TOPICS:
From the researchers that brought you BEAST and CRIME comes another attack against Secure Sockets Layer (SSL), one of the protocols that's used to secure Internet traffic from eavesdroppers both government and criminal.

SSL Under Attack by POODLE

October 15, 2014 10:11 am | by Peter Bright, Ars Technica | Comments

From the researchers that brought you BEAST and CRIME comes another attack against Secure Sockets Layer (SSL), one of the protocols that's used to secure Internet traffic from eavesdroppers both government and criminal.         

TOPICS:
It's not just big businesses like JPMorgan Chase, Target and Home Depot that get hacked. Small companies suffer from intrusions into their computer systems, too.

Hacking a Big Danger for Small Businesses

October 14, 2014 10:34 am | by Joyce Rosenberg, Associated Press | Comments

It's not just big businesses like JPMorgan Chase, Target and Home Depot that get hacked. Small companies suffer from intrusions into their computer systems, too.                         

TOPICS:
Advertisement

Snapsaved.com Claims Hackers Stole Snapchat Images

October 14, 2014 10:25 am | by Reuters | Comments

Snapsaved.com, a website which allows users to save images sent via Snapchat, claims that hackers had breached its servers and made off with some 500 megabytes of photographs.                     

TOPICS:
A group of cyber spies targeted the North Atlantic Treaty Organization (NATO), Ukrainian and Polish government agencies, and a variety of sensitive European industries over the last year, in some cases using a previously unknown flaw in Windows systems to

Sandworm Cyber Spies Target NATO, Ukraine

October 14, 2014 10:16 am | by Robert Lemos, Ars Technica | Comments

A group of cyber spies targeted the North Atlantic Treaty Organization (NATO), Ukrainian and Polish government agencies, and a variety of sensitive European industries over the last year, in some cases using a previously unknown flaw in Windows systems to infiltrate targets, according to a research report.

TOPICS:
The Mayhem botnet is here to wreak, well, mayhem — and it’s using the Shellshock vulnerability to do it with fresh purpose.

Mayhem Botnet Takes to Shellshock

October 14, 2014 9:55 am | by Tara Seals, Infosecurity Magazine | Comments

The Mayhem botnet is here to wreak, well, mayhem — and it’s using the Shellshock vulnerability to do it with fresh purpose.                                    

TOPICS:
Dropbox has denied that they have been hacked, and that the login credentials leaked by a unknown individual on Pastebin are those of Dropbox users.

Dropbox Says It Wasn't Hacked

October 14, 2014 9:45 am | by Zeljka Zorz, Help Net Security | Comments

Dropbox has denied that they have been hacked, and that the login credentials leaked by a unknown individual on Pastebin are those of Dropbox users.                             

TOPICS:
A class of coding vulnerabilities could allow attackers to fool Windows system administrators into running malicious code because of a simple omission: quotation marks.

Poor Punctuation Leads to Windows Shell Vulnerability

October 13, 2014 11:46 am | by Robert Lemos, Ars Technica | Comments

A class of coding vulnerabilities could allow attackers to fool Windows system administrators into running malicious code because of a simple omission: quotation marks.                       

TOPICS:

Snapchat Blames Third-party Apps for Leaked Photos

October 13, 2014 11:39 am | by Alexei Oreskovic, Reuters | Comments

Mobile messaging company Snapchat blamed third-party software apps for possible security lapses that may have led to its users' private photos being at risk of online publication by hackers.                 

TOPICS:
First via a filing with the US Securities and Exchange Commission, and then via a press release, Sears Holding Corporation has confirmed a month-old breach that affected POS systems at its Kmart stores.

Kmart Confirms Month-old Data Breach

October 13, 2014 11:32 am | by Zeljka Zorz, Help Net Security | Comments

First via a filing with the US Securities and Exchange Commission, and then via a press release, Sears Holding Corporation has confirmed a month-old breach that affected POS systems at its Kmart stores.             

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading