Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Even as the U.S. Air Force Academy has reduced the number of majors it offers recently, it has instituted a new program aimed at helping the Air Force fly, fight and win in cyberspace.

GIAC Network Forensic Analyst Certification

October 20, 2014 11:13 am | Comments

A new forensics certification, the GIAC Network Forensic Analyst, validates that professionals who hold this credential are qualified to perform examinations employing network forensic artifact analysis and demonstrate an understanding of network forensics, normal and abnormal conditions for common network protocols, the process and tools used to examine device and system logs, wireless communication, and encryption protocols.

TOPICS:

Old Phone Fraud Finds New Life in VOIP

October 20, 2014 11:06 am | Comments

Bob Foreman’s architecture firm was the victim of an age-old fraud that has found new life now that most corporate phone lines run over the Internet. Hackers had broken into the phone network of the company, Foreman Seeley Fountain Architecture, and routed $166,000 worth of calls from the firm to premium-rate telephone numbers in Gambia, Somalia and the Maldives.

TOPICS:
Admins of sites that run Drupal 7 are advised to update to the latest version of the platform — version 7.32 — because it fixes a critical SQL injection vulnerability that can ultimately lead to site hijacking and data theft.

Drupal Bug Opens Up Websites to Attack

October 16, 2014 11:25 am | by Zeljka Zorz, Help Net Security | Comments

Admins of sites that run Drupal 7 are advised to update to the latest version of the platform — version 7.32 — because it fixes a critical SQL injection vulnerability that can ultimately lead to site hijacking and data theft.       

TOPICS:
Advertisement
The Russian high-tech crime market for 2014 is showing ever-increasing sophistication, with criminals creating shadow worlds of illegal activity, exploiting new financial theft techniques and incorporating mobile attacks more often.

Russian Cyber Crime Refines Its Operations

October 16, 2014 11:15 am | by Tara Seals, Infosecurity Magazine | Comments

The Russian high-tech crime market for 2014 is showing ever-increasing sophistication, with criminals creating shadow worlds of illegal activity, exploiting new financial theft techniques and incorporating mobile attacks more often.     

TOPICS:
The cost and regularity of digital attacks against business continue to rise steadily, with no obvious end to the assault on the horizon.

Average Company Attacked Every Four Days

October 16, 2014 10:57 am | by Steve Ranger, ZDNet | Comments

The cost and regularity of digital attacks against business continue to rise steadily, with no obvious end to the assault on the horizon.                                

TOPICS:

FBI Warns US Businesses of Cyber Attacks Blaming China

October 16, 2014 10:04 am | by Jim Finkle, Reuters | Comments

The U.S. Federal Bureau of Investigation said on Wednesday that hackers it believes to be backed by the Chinese government have recently launched attacks on U.S. companies.                      

TOPICS:
Across the nation, private foundations are increasingly being tapped to provide police with technology and weaponry that — were it purchased with public money — would come under far closer scrutiny.

Private Donors Supply Spy Gear to Police

October 16, 2014 9:57 am | by Ali Winston and Darwin Bond Graham, ProPublica | Comments

Across the nation, private foundations are increasingly being tapped to provide police with technology and weaponry that — were it purchased with public money — would come under far closer scrutiny.         

TOPICS:
It’s easy to see how forensics used during a cyberattack investigation are similar to those used in a physical crime scene.

Crime Scene Mistakes Can Sink a Digital Forensic Investigation

October 16, 2014 9:33 am | by Jayne Friedland Holland, GCN | Comments

It’s easy to see how forensics used during a cyberattack investigation are similar to those used in a physical crime scene.                                    

TOPICS:
Advertisement
The sophisticated electronic components that are making modern cars safer, greener, and smarter are also making them dangerously vulnerable to cyber attacks.

Connected Cars Tough Fight with Cyber Crime

October 15, 2014 12:23 pm | by Jai Vijayan, Information Week | Comments

The sophisticated electronic components that are making modern cars safer, greener, and smarter are also making them dangerously vulnerable to cyber attacks.                           

TOPICS:
Digital forensics firm Cellebright has moved from copying contacts on mobile phones to digital forensics, helping police collar the bad guys along the way.

Company Gets Smartphones to Rat Out Criminal Owners

October 15, 2014 12:09 pm | by Niv Lilien, ZDNet | Cellebrite USA, Inc. | Comments

Digital forensics firm Cellebright has moved from copying contacts on mobile phones to digital forensics, helping police collar the bad guys along the way.                           

TOPICS:
In an interview with ISMG, Garet Moravec, an independent security consultant, offers a hypothetical example of thwarting Chinese hackers trying to breach a defense contractor's systems to pilfer designs on a jet fighter by using a honeypot, a trap contain

Hackers Manipulated as Advanced Threat Response

October 15, 2014 11:09 am | by Eric Chabrow, Gov Info Security | Comments

In an interview with ISMG, Garet Moravec, an independent security consultant, offers a hypothetical example of thwarting Chinese hackers trying to breach a defense contractor's systems to pilfer designs on a jet fighter by using a honeypot, a trap containing fake information that's designed to look like part of a network.

TOPICS:

Social Media No Help in Bank's Cyber Crime Fight

October 15, 2014 10:47 am | by Steve Slater, Reuters | Comments

Banks are fighting an uphill battle to protect themselves and their client accounts from cyber attacks, and the sometimes careless use of social media by customers and staff isn't making the fight any easier.           

TOPICS:
From the researchers that brought you BEAST and CRIME comes another attack against Secure Sockets Layer (SSL), one of the protocols that's used to secure Internet traffic from eavesdroppers both government and criminal.

SSL Under Attack by POODLE

October 15, 2014 10:11 am | by Peter Bright, Ars Technica | Comments

From the researchers that brought you BEAST and CRIME comes another attack against Secure Sockets Layer (SSL), one of the protocols that's used to secure Internet traffic from eavesdroppers both government and criminal.         

TOPICS:
It's not just big businesses like JPMorgan Chase, Target and Home Depot that get hacked. Small companies suffer from intrusions into their computer systems, too.

Hacking a Big Danger for Small Businesses

October 14, 2014 10:34 am | by Joyce Rosenberg, Associated Press | Comments

It's not just big businesses like JPMorgan Chase, Target and Home Depot that get hacked. Small companies suffer from intrusions into their computer systems, too.                         

TOPICS:

Snapsaved.com Claims Hackers Stole Snapchat Images

October 14, 2014 10:25 am | by Reuters | Comments

Snapsaved.com, a website which allows users to save images sent via Snapchat, claims that hackers had breached its servers and made off with some 500 megabytes of photographs.                     

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading