Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Leading prosecutors in New York and London police plan to embed staff in each others’ offices, officials say, increasing transatlantic collaboration in an effort to combat cybercrime.

London Police and NYC Prosecutors to Swap Staff in Cybercrime Fight

November 20, 2014 12:08 pm | by Sam Frizell, Time | Comments

Leading prosecutors in New York and London police plan to embed staff in each others’ offices, officials say, increasing transatlantic collaboration in an effort to combat cyber crime.                   

TOPICS:
Leading Democrats in both houses of Congress sent letters to 16 major banks and other financial firms requesting detailed information about recent data breaches and briefings from corporate data security officials.

House, Senate Democrats Seek Details on Data Breaches

November 19, 2014 9:57 am | by Reuters | Comments

Leading Democrats in both houses of Congress sent letters to 16 major banks and other financial firms requesting detailed information about recent data breaches and briefings from corporate data security officials.          

TOPICS:
Attackers will continue to resort to non-amplification attacks when there are not enough vulnerable systems available to exploit for reflection methods.There will be a rise in mobile DDoS attacks as emerging countries increase smartphone subscriber usage.

DDoS Attacks Shrinking, Switching to Mobile

November 19, 2014 9:34 am | by Black Lotus | Comments

Attackers will continue to resort to non-amplification attacks when there are not enough vulnerable systems available to exploit for reflection methods.There will be a rise in mobile DDoS attacks as emerging countries increase smartphone subscriber usage.

TOPICS:
Advertisement
The Senate on Tuesday blocked a bill to end bulk collection of Americans' phone records by the National Security Agency. The legislation would have ended the NSA's collection of domestic calling records, instead requiring the agency to obtain a court orde

Senate Blocks Shutdown of NSA Phone Records Collection

November 19, 2014 9:06 am | by Ken Dilanian, Associated Press | Comments

The Senate on Tuesday blocked a bill to end bulk collection of Americans' phone records by the National Security Agency. The legislation would have ended the NSA's collection of domestic calling records, instead requiring the agency to obtain a court order each time it wanted to analyze the records in terrorism cases, and query records held by the telephone companies.

TOPICS:
MIT has received $15 million in funding from the William and Flora Hewlett Foundation to establish an initiative aimed at laying the foundations for a smart, sustainable cybersecurity policy to deal with the growing cyber threats faced by governments, bus

Foundation Funds New Initiative on Cybersecurity Policy

November 19, 2014 8:41 am | by MIT | Comments

MIT has received $15 million in funding from the William and Flora Hewlett Foundation to establish an initiative aimed at laying the foundations for a smart, sustainable cybersecurity policy to deal with the growing cyber threats faced by governments, businesses, and individuals.

TOPICS:
The immensely popular Whatsapp instant messenger has the potential to become an even more attractive option for users, as the company has partnered with Open Whisper Systems to implement the latter's TextSecure protocol into their clients.

Open Whisper Systems Helps WhatsApp Achieve End-to-end Encryption

November 18, 2014 12:22 pm | by Zeljka Zorz, Help Net Security | Comments

The immensely popular Whatsapp instant messenger has the potential to become an even more attractive option for users, as the company has partnered with Open Whisper Systems to implement the latter's TextSecure protocol into their clients.   

TOPICS:
A large number of the Tor-anonymized domains recently seized in a crackdown on illegal darknet services were clones or imposter sites, according to an analysis published Monday.

Many Tor Domains Seized by Police are Imposters

November 18, 2014 11:58 am | by Dan Goodin, Ars Technica | Comments

A large number of the Tor-anonymized domains recently seized in a crackdown on illegal darknet services were clones or imposter sites, according to an analysis published Monday.                     

TOPICS:
Just a few weeks after its existence was revealed, Beijing police have arrested three people who are allegedly the authors of the WireLurker malware that targets Macs and iPhones.

WireLurker Suspects Arrested in Beijing

November 18, 2014 10:12 am | by Tara Seals, Infosecurity Magazine | Comments

Just a few weeks after its existence was revealed, Beijing police have arrested three people who are allegedly the authors of the WireLurker malware that targets Macs and iPhones.                    

TOPICS:
Advertisement
Time is not your friend when your information systems are under cyber attack, but sharing threat information before, during, and after an attack with a trusted group of peers can help. NIST has prepared a Guide to Cyber Threat Information Sharing that pro

NIST Wants to Help You Share

November 18, 2014 10:01 am | by NIST | Comments

Time is not your friend when your information systems are under cyber attack, but sharing threat information before, during, and after an attack with a trusted group of peers can help. NIST has prepared a Guide to Cyber Threat Information Sharing that provides organizations with the key practices they need to consider when planning, implementing and maintaining information sharing relationships.

TOPICS:
For years the government has refused to talk about or even acknowledge its secret use of zero-day software vulnerabilities to hack into the computers of adversaries and criminal suspects. This year, however, the Obama administration finally acknowledged t

US Gov Insists It Doesn't Stockpile Zero-day Exploits

November 17, 2014 12:16 pm | by Kim Zetter, Wired | Comments

For years the government has refused to talk about or even acknowledge its secret use of zero-day software vulnerabilities to hack into the computers of adversaries and criminal suspects. This year, however, the Obama administration finally acknowledged that the NSA and law enforcement agencies sometimes keep information about software vulnerabilities secret so the government can exploit them for purposes of surveillance and sabotage.

TOPICS:
Over half of senior IT and HR professionals would consider hiring former hackers in a bid to overcome crippling cybersecurity skills gaps and shortages, according to new research from consultancy KPMG.

Firms Would Hire Ex-cons as Cybersecurity Pros

November 17, 2014 11:28 am | by Phil Muncaster, Infosecurity Magazine | Comments

Over half of senior IT and HR professionals would consider hiring former hackers in a bid to overcome crippling cybersecurity skills gaps and shortages, according to new research from consultancy KPMG.             

TOPICS:
The State Department has taken the unprecedented step of shutting down its entire unclassified email system as technicians repair possible damage from a suspected hacker attack.

State Dept Hacked, Email Shut Down

November 17, 2014 10:57 am | by Matthew Lee, Associated Press | Comments

The State Department has taken the unprecedented step of shutting down its entire unclassified email system as technicians repair possible damage from a suspected hacker attack. A senior department official said Sunday that "activity of concern" was detected in the system around the same time as a previously reported incident that targeted the White House computer network. 

TOPICS:
Once again, ATMs have been "hacked" by individuals taking advantage of default, factory-set passcodes.

Default ATM Passcodes Still Exploited by Crooks

November 14, 2014 12:25 pm | by Zeljka Zorz, Help Net Security | Comments

Once again, ATMs have been "hacked" by individuals taking advantage of default, factory-set passcodes.                                          

TOPICS:

Russian Dark Web Drug Market Goes Further than Silk Roads

November 14, 2014 11:51 am | by Andy Greenberg, Wired | Comments

Silk Roads come and Silk Roads go. But after every law enforcement crackdown shakes the dark web, one Russian black market always seems to survive. For more than two and a half years, the Russian Anonymous Marketplace, or RAMP, has maintained a thriving business in the Dark Web drug trade, offering one of the Internet’s widest arrays of narcotics to its Russian-speaking clientele.

TOPICS:
Investigators recently set out to consider whether homicides involving social networking sites were unique and worthy of labels such as 'Facebook Murder', and to explore the ways in which perpetrators had used such sites in the homicides they had committe

Is there such a thing as 'Facebook Murder'?

November 14, 2014 11:37 am | by Wiley | Comments

Investigators recently set out to consider whether homicides involving social networking sites were unique and worthy of labels such as "Facebook Murder," and to explore the ways in which perpetrators had used such sites in the homicides they had committed.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading