Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Lean operations and a lack of technical staff make non-governmental organizations a prime, and relatively soft, target for well-funded adversaries, according to an academic study of a four-year campaign targeting one such group.

Activists are Easy Targets for Nation-state Attackers

August 13, 2014 9:38 am | by Robert Lemos, Ars Technica | Comments

Lean operations and a lack of technical staff make non-governmental organizations a prime, and relatively soft, target for well-funded adversaries, according to an academic study of a four-year campaign targeting one such group.      

TOPICS:

Snowden Left Clues the NSA Couldn't Find

August 13, 2014 9:27 am | by Andy Greenberg, Wired | Comments

If the NSA still doesn’t know the full extent of the greatest leak of secrets in its history, it’s not because of Edward Snowden’s attempts to cover his tracks. On the contrary, the NSA’s most prolific whistleblower now claims he purposefully left a trail of digital bread crumbs designed to lead the agency directly to the files he’d copied.

TOPICS:
Hackers can be tough opponents because the best of them share ideas online about new ways to attack networks and how to hide from law enforcement. Gangs in nations like Russia or China can be particularly resourceful and dangerous — especially since gover

Battling Hackers Like Organized Crime

August 12, 2014 11:39 am | by Tom Risen. U.S. News & World Report | Comments

Hackers can be tough opponents because the best of them share ideas online about new ways to attack networks and how to hide from law enforcement. Gangs in nations like Russia or China can be particularly resourceful and dangerous — especially since governments there are secretly sponsoring hackers' efforts and protecting them from international law enforcement.

TOPICS:
Advertisement

Espionage Programs Linked to Spying on Former Soviet Targets

August 12, 2014 11:08 am | by Robert Lemos, Ars Technica | Comments

A one-two combination of malware programs has infiltrated the embassies and government systems of a number of former Eastern Bloc nations as well as European targets, according to a technical analysis by security researchers.       

TOPICS:
Computer forensic and cybersecurity tools are getting smarter and easier to use by the week, but I'd like to offer a contrarian view and tell you that it's not necessarily a good thing. Better tools — or rather, better tool marketing—can lull you into a f

The Myth of the 'Find All Evidence' Button

August 12, 2014 10:12 am | by John I., LinkedIn | Comments

Computer forensic and cybersecurity tools are getting smarter and easier to use by the week, but I'd like to offer a contrarian view and tell you that it's not necessarily a good thing. Better tools — or rather, better tool marketing — can lull you into a false sense of security.

TOPICS:
Researchers have discovered click fraud malware designed to “hide in plain sight” and evade traditional security tools by embedding data into an image file.

Click Fraud Malware Found Lurking Inside Image Files

August 12, 2014 8:12 am | by Phil Muncaster, Infosecurity Magazine | Comments

Researchers have discovered click fraud malware designed to “hide in plain sight” and evade traditional security tools by embedding data into an image file.                           

TOPICS:
At this year's edition of the Black Hat security conference, a group of researchers has shown how extremely easy is to hack into the smart thermostats manufactured by Nest.

Spies Can Turn Smart Nest Thermostat

August 11, 2014 10:29 am | by Zeljka Zorz, Help Net Security | Comments

At this year's edition of the Black Hat security conference, a group of researchers has shown how extremely easy is to hack into the smart thermostats manufactured by Nest.                      

TOPICS:
Alarmed by mounting cyber threats around the world and across industries, a growing number of security experts see aggressive government action as the best hope for averting disaster.

Security Experts Call for Government Action against Cyber Threats

August 11, 2014 10:12 am | by Joseph Menn, Reuters | Comments

Alarmed by mounting cyber threats around the world and across industries, a growing number of security experts see aggressive government action as the best hope for averting disaster.                   

TOPICS:
Advertisement
Network breaches are inevitable. It’s what happens next that really matters, said renowned cryptographic expert Bruce Schneier during the Black Hat security conference.

Incident Response Best Practice and Automation

August 11, 2014 10:00 am | by Fahmida Rashid, Infosecurity Magazine | Comments

Network breaches are inevitable. It’s what happens next that really matters, said renowned cryptographic expert Bruce Schneier during the Black Hat security conference.                       

TOPICS:
Software created by the controversial U.K. based Gamma Group International was used to spy on computers that appear to be located in the United States, the U.K., Germany, Russia, Iran and Bahrain, according to a leaked trove of documents. It's not clear w

Leaked Docs Show Spyware Used to Snoop on US Computers

August 11, 2014 9:52 am | by Jeff Larson and Mike Tigas, ProPublica | Comments

Software created by the controversial U.K. based Gamma Group International was used to spy on computers that appear to be located in the United States, the U.K., Germany, Russia, Iran and Bahrain, according to a leaked trove of documents. It's not clear whether the surveillance was conducted by governments or private entities.

TOPICS:

Hackers Are Waging Cyberwar Against Israel and Palestine

August 8, 2014 10:03 am | Comments

Fighting in the Gaza Strip hit a lull this week as a 72-hour cease-fire ends its third and final day Thursday — but a digital war has still been raging as hackers pay little mind to the temporary truce. Cyberattacks directed against Israel have increased dramatically since it invaded Gaza in early July, intensifying last month as the violence peaked.

TOPICS:

The World’s Top 5 Cybercrime Hotspots

August 8, 2014 9:55 am | Comments

“It appears more cybercriminals are entering into the game at a quicker pace than quite honestly we can keep up with [in the US] to defend our networks from these malicious hackers,” says JD Sherry, the vice president of technology and solutions at Trend Micro, a Tokyo-based cyber-security firm. Here’s a look at the global hotspots for these cyber criminals.

TOPICS:

To Solve Cybercrime, Some In Silicon Valley Ditch The Data

August 8, 2014 9:51 am | Comments

Collecting data about people has become $1 trillion industry, but keeping this information safe is proving near impossible. So, a small group of entrepreneurs and developers are building new technologies that don't rely on data as a digital currency.

TOPICS:

Aaron's Law Doomed

August 7, 2014 9:40 am | Comments

A bill named after the late internet activist Aaron Swartz that was supposed to update much-criticized US hacking law is almost certain to be left to wither in Congress, according to various sources with knowledge of the matter. 

TOPICS:

BYU Student Hacked into School Computers

August 7, 2014 9:34 am | Comments

A 26-year-old Brigham Young University student, Gabriel Camacho, has been arrested on charges of hacking into the school's computer system after an investigation by the BYU and Lindon police departments that began in January 2014. Police reported BYU Information Technology employees discovered a breach in Internet security that they were able to trace back to an office in the Wilkinson Student Center. 

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading