Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Cylance has detailed coordinated attacks by hackers with ties to Iran on more than 50 targets in 16 countries around the globe. Victim organizations were found in a variety of critical industries, with most attacks on airlines and airports, energy, oil an

Iran-based Cyber Attacks on Global Infrastructure Exposed

December 2, 2014 10:09 am | by Cylance | Comments

Cylance has detailed coordinated attacks by hackers with ties to Iran on more than 50 targets in 16 countries around the globe. Victim organizations were found in a variety of critical industries, with most attacks on airlines and airports, energy, oil and gas, telecommunications companies, government agencies and universities.

TOPICS:
Newly discovered court documents from two federal criminal cases in New York and California that remain otherwise sealed suggest that the Department of Justice (DOJ) is pursuing an unusual legal strategy to compel cellphone makers to assist investigations

Gov Seeks Apple's Help with Encrypted Phones

December 1, 2014 11:26 am | by Cyrus Farivar, Ars Technica | Comments

Newly discovered court documents from two federal criminal cases in New York and California that remain otherwise sealed suggest that the Department of Justice (DOJ) is pursuing an unusual legal strategy to compel cellphone makers to assist investigations.

TOPICS:
On 26 and 27 November, law enforcement agencies from all over the world, in cooperation with the airline, travel and credit card industries, joined forces in a major concerted action to combat online fraud.

Online Fraudsters Arrested in Airline Action

December 1, 2014 11:05 am | by Help Net Security | Comments

On 26 and 27 November, law enforcement agencies from all over the world, in cooperation with the airline, travel and credit card industries, joined forces in a major concerted action to combat online fraud.             

TOPICS:
Advertisement
Sony Pictures Entertainment has hired FireEye Inc's Mandiant forensics unit to clean up a massive cyber attack that knocked out the studio's computer network nearly a week ago, three people with knowledge of the matter said.

Sony Hires Mandiant after Cyber Attack

December 1, 2014 10:51 am | by Reuters | Comments

Sony Pictures Entertainment has hired FireEye Inc's Mandiant forensics unit to clean up a massive cyber attack that knocked out the studio's computer network nearly a week ago, three people with knowledge of the matter said.       

TOPICS:
A Danish citizen has had the dubious honor of becoming the first ever person to be convicted of selling spyware in the US.

Danish Man Pleads Guilty to Selling Spyware App

December 1, 2014 10:37 am | by Phil Muncaster, Infosecurity Magazine | Comments

A Danish citizen has had the dubious honor of becoming the first ever person to be convicted of selling spyware in the US.                                     

TOPICS:

UAlbany to Host Data Breach Research Laboratory

November 26, 2014 8:35 am | Comments

The University at Albany School of Business has been selected to host a research laboratory designed to improve exploration into cyber security and incident response. Computer forensic leader, The ARC Group of New York (ARC), has donated software and services valued at more than a half million dollars to support this critical endeavor.

TOPICS:
The Federal Bureau of Investigation will soon open its Malware Investigator   portal to the private sector. Malware Investigator, which the agency began   developing in 2013 based on the success of its Binary Analysis Characterization and Storage System

Why it Took Years to Discover Regin

November 26, 2014 8:25 am | Comments

After Symantec published its report on the Regin super-spyware, there were many questions raised. Who coded it? What can it do? And – above all – why did it take so long for security vendors to notice it?

TOPICS:

Hacking Down for the Holidays

November 26, 2014 8:19 am | Comments

The holiday sales season and the online crush that accompanies it might seem a natural field day for hackers looking to attack the small and midsize retailers who depend on these sales to bump them into the black. Surprisingly, it's not.

TOPICS:
Advertisement
MIT has received $15 million in funding from the William and Flora Hewlett Foundation to establish an initiative aimed at laying the foundations for a smart, sustainable cybersecurity policy to deal with the growing cyber threats faced by governments, bus

Cybersecurity Myths

November 25, 2014 6:52 am | Comments

Despite the ongoing media commentary and “best practices” memos, consultant Adam Epstein of Third Creek Advisors notes that board members of small-cap companies and those considering or preparing initial public offerings are still befuddled by persistent myths on this topic.

TOPICS:

Project Targets Automotive Vulnerabilities

November 25, 2014 5:32 am | by Justin Pritchard, Associated Press | Comments

White hat hackers have demonstrated that they could create the electronic equivalent of a skeleton key to unlock car's networks. The project's goal is more than just to plug vulnerabilities--it is to reconceive the most critical lines of computer code that control the car in a way that could make them invulnerable to some of the major known threats.   

TOPICS:
FBI Director James Comey has compared Chinese hackers to a "drunk burglar" — not so subtle, but prolific and reckless enough to cost US companies billions each year.

Hackers Blackmail Sony Pictures

November 25, 2014 5:21 am | Comments

Yesterday, employees across the Sony Pictures offices were greeted with a strange picture as they tried to login to their computers. Computers at the company were completely unresponsive, showing a glowering CGI skeleton, a series of URL addresses, and a threatening message from a hacker group that identifies itself as #GOP. 

TOPICS:

Competition Battles Fingerprint and Iris Spoofing

November 25, 2014 5:16 am | Comments

A competition that challenges academic and private institutions to present solutions to fingerprint or iris spoofing is set to hold its fourth edition, with organisers saying it will play a “crucial” role in evaluating the current state of the technology.  

TOPICS:
Locked Shields is among the world’s preeminent cyberattack simulations. For two days, international teams of hackers and system admins play both sides of a war game, simultaneously attacking and defending critical infrastructure. The details are realistic

Government Vulnerable to Hackers

November 24, 2014 5:35 am | Comments

Even though there have been at least two dozen mass breaches of government computer systems since 2013, many federal agencies continue to have a lax culture and poor security provisions to repel the growing threat from hackers and cyberattacking states such as Russia, Iran and China, internal investigative reports show. 

TOPICS:
The National Institute of Standards and Technology (NIST) has published its NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0, a document that reflects advances in smart grid technologies and developments from NIST’s collab

Hacking Risks to US Infrastucture

November 24, 2014 5:30 am | Comments

There’s been a lot of discussion lately about the risks posed by hackers to America’s critical infrastructure systems, with terms like “cyber-Pearl Harbor” and “cyber-9/11” being bandied about by government officials and other prominent figures.

TOPICS:
The Federal Bureau of Investigation will soon open its Malware Investigator   portal to the private sector. Malware Investigator, which the agency began   developing in 2013 based on the success of its Binary Analysis Characterization and Storage System

Regin: Most Sophisticated Malware Yet

November 24, 2014 5:15 am | Comments

A cyber snooping operation reminiscent of the Stuxnet worm and billed as the world's most sophisticated computer malware is targeting Russian and Saudi Arabian telecoms companies. Cyber security company Symantec said the malware, called "Regin", is probably run by a western intelligence agency and in some respects is more advanced in engineering terms than Stuxnet.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading