Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Boxee.tv Hack Exposes Password Data, Messages

April 2, 2014 10:12 am | by Dan Goodin, Ars Technica | Comments

Hackers posted names, email addresses, message histories, and partially protected login credentials for more than 158,000 forum users of Boxee.tv.                             

TOPICS:

Cyber Criminals Seek Bargains

April 2, 2014 10:01 am | by Kelly Jackson Higgins, Dark Reading | Comments

Most cyber attacks today are waged by cost-conscious criminals who mostly repurpose malware and other techniques to get the most bang for their buck, a new study finds.                       

TOPICS:

Advanced Evasion Techniques and APTs Cost Businesses Millions

April 2, 2014 8:09 am | by Infosecurity | Comments

Misunderstandings, misinterpretation and ineffective safeguards in use by the security experts charged with protecting sensitive data have led to both controversy and confusion surrounding advanced evasion techniques (AETs), and the role that they play in advanced persistent threats (APTs).

TOPICS:
Advertisement

Federal Agents Pierce Tor Web-anonymity Tool

April 1, 2014 10:38 am | by Andrew Grossman, The Wall Street Journal | Comments

Law-enforcement agencies are increasingly finding ways to unmask users of a popular Web browser designed to hide identities and allow individuals to exist online anonymously.                     

TOPICS:

Deadbolt Comments on MH370 Digital Investigation

April 1, 2014 10:21 am | Deadbolt Forensics LLC | Comments

Deadbolt Forensics has commented on the role that digital forensics has played during the investigation into the disappearance of Malaysian Airlines flight MH370.                         

TOPICS:

Wisconsin Police to Secretly Track Cellphone Locations

April 1, 2014 10:03 am | by Associated Press | Comments

Police in Wisconsin have at least two devices that secretly track cellphone locations in real time to target suspects or missing persons, according to a published report.                       

TOPICS:

White House Issues Plan to End Section 215 Bulk Data Collection

March 31, 2014 10:55 am | by Infosecurity | Comments

As expected, the White House has issued a plan to end the Section 215 bulk data collection program as it exists today, under which the National Security Agency has been conducting mass surveillance of U.S. citizens’ phone records.     

TOPICS:

NSA Infiltrated RSA Security More Deeply than Thought

March 31, 2014 10:39 am | by Joseph Menn, Reuters | Comments

Security industry pioneer RSA adopted not just one but two encryption tools developed by the U.S. National Security Agency, greatly increasing the spy agency's ability to eavesdrop on some Internet communications, according to a team of academic researchers.

TOPICS:
Advertisement

Journalists Attacked by Hackers

March 31, 2014 10:34 am | by Joe Silver, Ars Technica | Comments

According to a new paper authored by two Google security engineers, 21 out of the world’s top 25 news organizations have been successfully hacked by state-sponsored actors.                      

TOPICS:

Incident Response Now Shaping Security Operations

March 31, 2014 10:12 am | by Kelly Jackson Higgins, Dark Reading | Comments

Now that organizations and the security industry for the most part have accepted the ugly truth that breaches are inevitable and the bad guys are going to find a way to get inside, the new focus is on how you respond to an attack or attack attempt and minimize the damage.

TOPICS:

Recovering Data from Malaysian Flight 370 Passenger's Mobile Devices

March 31, 2014 9:35 am | Comments

If Malaysian flight 370 is ever recovered, could draft text messages, videos, and other electronically stored information retrieved from passenger’s mobile phones and other digital devices help tell the story of the doomed airliner’s fate?

TOPICS:

Goverment Wants Expanded Ability to Hack Criminal Suspects' Computers

March 28, 2014 10:28 am | by Cyrus Farivar, Ars Technica | Comments

The United States Department of Justice wants to broaden its ability to hack criminal suspects’ computers, according to a new legal proposal that was first published by The Wall Street Journal.                

TOPICS:

China Says Hacking Attacks Soar in 2013

March 28, 2014 10:11 am | by Reuters | Comments

Hacking attacks on Chinese computers in 2013 rose by more than half compared with the previous year, with attacks coming from the United States making up a significant proportion, China's top Internet security agency says.       

TOPICS:

Attacks Rise On Network 'Blind' Spot

March 28, 2014 10:08 am | by Kelly Jackson Higgins, Dark Reading | Comments

The most high-profile attacks on Domain Name Service (DNS) servers are distributed denial-of-service (DDoS) attacks, but there are even more nefarious attacks on these systems underway today as cyber criminals and APT actors abuse commonly vulnerable DNS servers.

TOPICS:

Analysis Finds 28 Internet DDoS Occur Every Hour

March 27, 2014 11:17 am | by NSFOCUS | Comments

NSFOCUS has released its DDoS Threat Report 2013, which details attack trends and methodologies over the past year. The report expands on the top 10 findings released in February to include statistical analysis and key observations based on the 244,703 DDoS incidents. 

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading