Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Kaspersky Lab researched the Darkhotel espionage campaign, which has lurked in the shadows for at least four years while stealing sensitive data from selected corporate executives traveling abroad.

Asian Darkhotel Steals Data from Traveling Executives

November 10, 2014 10:43 am | by Zeljka Zorz, Help Net Security | Comments

Kaspersky Lab researched the Darkhotel espionage campaign, which has lurked in the shadows for at least four years while stealing sensitive data from selected corporate executives traveling abroad.               

TOPICS:
A detailed analysis by cybersecurity experts from the University of Maryland found that website administrators nationwide tasked with patching security holes exploited by the Heartbleed bug may not have done enough.

Researchers Discover Lapses in Heartbleed Bug Fix

November 10, 2014 10:03 am | by University of Maryland | Comments

A detailed analysis by cybersecurity experts from the University of Maryland found that website administrators nationwide tasked with patching security holes exploited by the Heartbleed bug may not have done enough.          

TOPICS:
Facebook’s latest transparency report shows that requests for member information from US law enforcement agencies is up in the first six months of 2014 — reaching 15,433 total requests for American user data related to 23,667 accounts.

Facebook Reports Increased Law Enforcement Info Requests

November 7, 2014 12:18 pm | by Tara Seals, Infosecurity Magazine | Comments

Facebook’s latest transparency report shows that requests for member information from US law enforcement agencies is up in the first six months of 2014 — reaching 15,433 total requests for American user data related to 23,667 accounts.    

TOPICS:
Advertisement
It only took about one month from the time the Silk Road drug-dealing website   was busted for a successor to be created. Silk Road 2.0 took steps beyond   those of the first version of the website to remain anonymous, but those   steps weren't enough to

Silk Road 2.0 Had Someone Inside from the Start

November 7, 2014 11:33 am | by Joe Mullin, Ars Technica | Comments

It only took about one month from the time the Silk Road drug-dealing website was busted for a successor to be created. Silk Road 2.0 took steps beyond those of the first version of the website to remain anonymous, but those steps weren't enough to protect the site from old-fashioned human infiltration.

TOPICS:
When “Operation Onymous” first came to light, it looked like a targeted   strike against a few high value targets in the Dark Web drug trade. Now the   full scope of that international law enforcement crackdown has been revealed,   and it’s a scorched-ear

Global Law Enforcement Cracks Down on Dark Net

November 7, 2014 11:03 am | by Andy Greenberg, Wired | Comments

When “Operation Onymous” first came to light, it looked like a targeted strike against a few high value targets in the Dark Web drug trade. Now the full scope of that international law enforcement crackdown has been revealed, and it’s a scorched-earth purge of the Internet underground.

TOPICS:
Hackers stole 53 million email addresses in addition to customers' card data, Home Depot said Thursday. The nation's largest home improvement chain had disclosed the massive, months-long breach of 56 million debit and credit cards in September.

Home Depot Hackers Also Stole 53M Email Addresses

November 7, 2014 10:38 am | by Anne D'Innocenzio and Sarah Skidmore Sell, Associated Press | Comments

Hackers stole 53 million email addresses in addition to customers' card data, Home Depot said Thursday. The nation's largest home improvement chain had disclosed the massive, months-long breach of 56 million debit and credit cards in September.

TOPICS:
As hacking attacks reach epidemic proportions, the US cybersecurity community is looking at new ways to step up defense, including counterattacking the hackers themselves.

US Not Hacking Back Yet against Cyber Attacks

November 6, 2014 12:24 pm | by Rob Lever, AFP | Comments

As hacking attacks reach epidemic proportions, the US cybersecurity community is looking at new ways to step up defense, including counterattacking the hackers themselves.                       

TOPICS:
Routine, unsanctioned file sharing among employees has put organizations at risk equal to or greater than the dangers posed by direct data theft, according to research.

Whose file sharing tools are leaking data?

November 6, 2014 12:11 pm | by GCN | Comments

Routine, unsanctioned file sharing among employees has put organizations at risk equal to or greater than the dangers posed by direct data theft, according to research.                       

TOPICS:
Advertisement
For most of the iPhone's lifespan, it's been effectively immune to malware. There were theoretical attacks and viruses targeting jailbroken phones, but thanks to the tight controls of the App Store, finding iOS malware in the wild has been nearly impossib

The iPhone Just Lost Its Perfect Security Record

November 6, 2014 11:56 am | by Russell Brandom, The Verge | Comments

For most of the iPhone's lifespan, it's been effectively immune to malware. There were theoretical attacks and viruses targeting jailbroken phones, but thanks to the tight controls of the App Store, finding iOS malware in the wild has been nearly impossible. Yesterday, that changed. 

TOPICS:
 Researchers have discovered new capabilities in the BlackEnergy crimeware tool that significantly extend its reach. The ability to run on network devices, steal digital certificates, and render infected computers unbootable are just a few of new-found we

Crimeware Gets Powerful New Functions

November 5, 2014 10:06 am | by Dan Goodin, Ars Technica | Comments

Researchers have discovered new capabilities in the BlackEnergy crimeware tool that significantly extend its reach. The ability to run on network devices, steal digital certificates, and render infected computers unbootable are just a few of new-found weapons in its arsenal.

TOPICS:
Targeted attacks could soar next year as increasing numbers of cyber-criminals in different geographies get their hands on the tools and techniques necessary to do the job, according to Trend Micro.

Targeted Attacks Could Go Mainstream Next Year

November 5, 2014 9:54 am | by Phil Muncaster, Infosecurity Magazine | Comments

Targeted attacks could soar next year as increasing numbers of cyber-criminals in different geographies get their hands on the tools and techniques necessary to do the job, according to Trend Micro.               

TOPICS:
One of the founders of popular file-sharing website The Pirate Bay has been arrested under an Interpol warrant as he was crossing into Thailand from Laos, police said Tuesday.

Pirate Bay Co-founder Arrested at Thai-Lao Border

November 5, 2014 9:43 am | by Thanyarat Diksone, Associated Press | Comments

One of the founders of popular file-sharing website The Pirate Bay has been arrested under an Interpol warrant as he was crossing into Thailand from Laos, police said Tuesday.                     

TOPICS:
Many companies offer "secure messaging" products — but how can users know if these systems actually secure? The Electronic Frontier Foundation has released its Secure Messaging Scorecard, evaluating dozens of messaging technologies on a range of security

Which Messaging Technologies are Truly Safe and Secure?

November 5, 2014 9:34 am | by EFF | Comments

Many companies offer "secure messaging" products — but how can users know if these systems actually secure? The Electronic Frontier Foundation has released its Secure Messaging Scorecard, evaluating dozens of messaging technologies on a range of security best practices.

TOPICS:
A flaw in Visa’s contactless credit cards means they will approve unlimited   cash transactions without a PIN when the amount is requested in a foreign   currency.

Fake POS Steals Foreign Currency through Visa Contactless Payments

November 4, 2014 11:26 am | by Newcastle University | Comments

A flaw in Visa’s contactless credit cards means they will approve unlimited cash transactions without a PIN when the amount is requested in a foreign currency.                         

TOPICS:
As the pro-democracy movement in Hong Kong has continued to mount a series of protests, attackers believed to be China-backed have launched a series of distributed denial of service attacks (DDoS) against websites promoting the movement there.

Chinese APT Actors Linked to DDoS against Hong Kong's Protesters

November 4, 2014 11:09 am | by Tara Seals, Infosecurity Magazine | Comments

As the pro-democracy movement in Hong Kong has continued to mount a series of protests, attackers believed to be China-backed have launched a series of distributed denial of service attacks (DDoS) against websites promoting the movement there. 

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading