Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Active Malware Operation Let Attackers Sabotage US Energy Industry

July 1, 2014 11:48 am | by Dan Goodin, Ars Technica | Comments

Researchers have uncovered a malware campaign that gave attackers the ability to sabotage the operations of energy grid owners, electricity generation firms, petroleum pipelines, and industrial equipment providers.          

TOPICS:

Microsoft Sues to Seize Domains Responsible for Malware Infections

July 1, 2014 11:40 am | by Ericka Chickowski, Dark Reading | Comments

After detecting more than 7.4 million infections among its customers by the Jenxcus and Bladabindi worms, Microsoft kicked off legal action to disrupt these pervasive malware threats.                   

TOPICS:

The Frontier of Cloud Forensics

July 1, 2014 11:23 am | by William Jackson, GCN | Comments

Cloud computing helps to make data more accessible, but the same technologies that make it readily available — on-demand provisioning, reprovisioning and virtual environments — also can obscure it. This is creating new challenges for digital forensics, complicating incident response and criminal and civil investigations into incidents and data in the cloud.

TOPICS:
Advertisement

New N.S.A. Chief Calls Damage From Snowden Leaks Manageable

June 30, 2014 10:19 am | Comments

The newly installed director of the National Security Agency says that while he has seen some terrorist groups alter their communications to avoid surveillance techniques revealed by Edward J. Snowden, the damage done over all by a year of revelations does not lead him to the conclusion that “the sky is falling.”

TOPICS:

California Authorities Arrest 275 Child Predators

June 30, 2014 10:05 am | by Tami Abdollah, Associated Press | Comments

A monthlong national effort to capture sex predators led to 275 arrests in Southern California that included a teaching assistant for special needs kids, a retired sheriff's deputy and a U.S. Army soldier. The effort dubbed "Operation Broken Heart" involved dozens of local, state and federal authorities throughout the month of May who targeted sex offenders, child sex traffickers, pimps, child porn traders and sex tourists traveling abroad.

TOPICS:

Rebekah Brooks Vindicated by Hacking Acquittal

June 30, 2014 5:31 am | by Jill Lawless, Associated Press | Comments

Former News of the World editor Rebekah Brooks said Thursday she is innocent ofphone hacking and other crimes and feels vindicated by a jury's unanimous decision to acquit her. The ex-tabloid editor made her first public statement since being cleared after an eight-month trial on charges of conspiring to hack phones, bribe officials and obstruct police.

TOPICS:

NASA's Curiosity Rover Brought Earth BUG to Mars

June 30, 2014 5:15 am | by Darren Pauli | Comments

A 20 year old bug has been discovered in an algorithm so pervasive it's used in the Mars Curiosity rover, cars, aircraft, Android phones and a string of popular open source wares. The bug can be found in the Lempel-Ziv-Oberhumer (LZO) data compression algorithm created by Markus Oberhumer, who on Wednesday posted a new version 2.07 of the code and revealed the bug.

TOPICS:
The bitcoin world kicked into high gear Friday as the US government began auctioning some of the virtual currency seized in an FBI investigation of dark Web bazaar Silk Road.

US Marshals Selling Silk Road Bitcoins Today

June 27, 2014 1:49 pm | by Phys.org | Comments

The bitcoin world kicked into high gear Friday as the US government began auctioning some of the virtual currency seized in an FBI investigation of dark Web bazaar Silk Road. The US Marshals Service auction was taking place until 2200 GMT for 29,000 bitcoins — about $17 million at current rates, although bitcoin values have been highly volatile.

TOPICS:
Advertisement
A South St. Paul burglar effectively updated his status to "busted" when he logged into Facebook on a computer in the home he is accused of breaking into, prosecutors say.

Burglar Fails to Log Off Facebook

June 27, 2014 1:17 pm | by Marino Eccher, Pioneer Press | Comments

A South St. Paul burglar effectively updated his status to "busted" when he logged into Facebook on a computer in the home he is accused of breaking into, prosecutors say.                       

TOPICS:
The German government has cancelled a contract with U.S. telecoms firm Verizon Communications Inc as part of an overhaul of its internal communications, prompted by revelations last year of U.S. government spying.

German Government Cancels Verizon Contract because of US Spying

June 27, 2014 1:06 pm | by Reuters | Comments

The German government has cancelled a contract with U.S. telecoms firm Verizon Communications Inc as part of an overhaul of its internal communications, prompted by revelations last year of U.S. government spying.           

TOPICS:
Aging, unsupported equipment leaves devices wide open to hackers and criminals. Old, outdated equipment also tends to have old, outdated software — and that means that new, updated malware can have a field day with it.

Half of All Network Devices are Outdated – and Vulnerable

June 27, 2014 12:54 pm | by Infosecurity | Comments

Aging, unsupported equipment leaves devices wide open to hackers and criminals. Old, outdated equipment also tends to have old, outdated software — and that means that new, updated malware can have a field day with it.         

TOPICS:
Android and iOS mobile trojans likely used for surveillance through mobile devices of journalists and politicians, activists and human rights advocates have been discovered circulating in the wild.

Mobile Surveillance Trojans for iOS and Android Proliferate Worldwide

June 26, 2014 12:45 pm | by Infosecurity | Comments

Android and iOS mobile trojans likely used for surveillance through mobile devices of journalists and politicians, activists and human rights advocates have been discovered circulating in the wild.               

TOPICS:
Embedded systems — small computer systems built around microcontrollers — are becoming more common. But they remain vulnerable to security breaches.

Making the Internet of Things Safer

June 26, 2014 12:16 pm | by UC San Diego | Comments

As a result of the advance of the so-called Internet of Things, where all devices are connected and communicate with one another, embedded systems — small computer systems built around microcontrollers — are becoming more common. But they remain vulnerable to security breaches.

TOPICS:
Utica College has been designated as a National Center of Academic Excellence in Information Assurance and Cyber Defense Education by the National Security Agency (NSA) and the Department of Homeland Security.

UC Cyber Progams Endorsed by Major Government Agencies

June 25, 2014 4:16 pm | by Victoria Lamanna, Utica College | Comments

Utica College has been designated as a National Center of Academic Excellence in Information Assurance and Cyber Defense Education by the National Security Agency (NSA) and the Department of Homeland Security. In addition, it's only the seventh institution of higher learning in the country to earn a National Center for Digital Forensics Academic Excellence (CDFAE) from the Defense Cyber Crime Center (DC3).

In an emphatic defense of privacy in the digital age, a unanimous Supreme Court ruled Wednesday that police generally may not search the cellphones of people they arrest without first getting search warrants.

Police Need a Warrant to Search Cell Phones, Justices Say

June 25, 2014 3:24 pm | by Mark Sherman, Associated Press | Comments

In an emphatic defense of privacy in the digital age, a unanimous Supreme Court ruled Wednesday that police generally may not search the cellphones of people they arrest without first getting search warrants.            

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading