Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

The six-year old Conficker worm is still a major presence in the threat landscape, accounting for 38 percent of all detections in the first half of 2014, according to security vendor F-Secure’s latest Threat Report.

Conficker Most Reported Security Threat in 2014

September 8, 2014 12:45 pm | by Phil Muncaster, Infosecurity Magazine | Comments

The six-year old Conficker worm is still a major presence in the threat landscape, accounting for 38 percent of all detections in the first half of 2014, according to security vendor F-Secure’s latest Threat Report.          

TOPICS:
In late May, an international law enforcement effort disrupted the Gameover Zeus (GoZ) botnet, a network of compromised computers used for banking fraud. The crackdown effectively eliminated the threat from Cryptolocker. Yet, ransomware is not dead, two r

Ransomware Going Strong, Despite Takedown of Gameover Zeus

September 8, 2014 12:37 pm | by Robert Lemos, Ars Technica | Comments

In late May, an international law enforcement effort disrupted the Gameover Zeus (GoZ) botnet, a network of compromised computers used for banking fraud. The crackdown effectively eliminated the threat from Cryptolocker. Yet, ransomware is not dead, two recent analyses have found. 

TOPICS:
The Chinese authorities have launched a man-in-the-middle attack campaign against users of the country’s research and education network CERNET who try to search via Google, in a bid to monitor and censor the HTTPS site.

China Launches Man in the Middle Attack against Google

September 5, 2014 1:31 pm | by Phil Muncaster, Infosecurity Magazine | Comments

The Chinese authorities have launched a man-in-the-middle attack campaign against users of the country’s research and education network CERNET who try to search via Google, in a bid to monitor and censor the HTTPS site.         

TOPICS:
Advertisement
Home Depot has not yet confirmed that a slew of fraudulent transactions came from a breach of its systems, yet an increasing body of evidence is mounting that points to a massive compromise linked to the home-supply retail chain.

Home Depot Breach a Near Certainty

September 5, 2014 1:14 pm | by Robert Lemos, Ars Technica | Comments

Home Depot has not yet confirmed that a slew of fraudulent transactions came from a breach of its systems, yet an increasing body of evidence is mounting that points to a massive compromise linked to the home-supply retail chain.     

TOPICS:
Around 350 Android apps that can be downloaded from Google play and Amazon stores fail to properly validate SSL certificates for HTTPS connections, and thus open users to Man-in-the-Middle attacks if they use them on insecure and open networks, a research

Researchers Compile List of Android Apps that Allow MitM Attacks

September 5, 2014 1:06 pm | by Zeljka Zorz, Help Net Security | Comments

Around 350 Android apps that can be downloaded from Google play and Amazon stores fail to properly validate SSL certificates for HTTPS connections, and thus open users to Man-in-the-Middle attacks if they use them on insecure and open networks, a researcher has warned.

TOPICS:
Home improvement retailer Home Depot Inc has been in contact with the U.S. Secret Service about an alleged major breach of customer and credit card data that came to light this week, a law enforcement source has told Reuters.

Secret Service Contacted over Alleged Home Depot Breach

September 4, 2014 12:50 pm | by Reuters | Comments

Home improvement retailer Home Depot Inc has been in contact with the U.S. Secret Service about an alleged major breach of customer and credit card data that came to light this week, a law enforcement source has told Reuters.     

TOPICS:
The underground market for cybercrime products and services in China is booming, with both the number of participants and IM messages sent between those participants doubling last year, according to new research from Trend Micro.

Chinese Cybercrime Soars as Tools are Traded Online

September 4, 2014 12:35 pm | by Phil Muncaster, Infosecurity Magazine | Comments

The underground market for cybercrime products and services in China is booming, with both the number of participants and IM messages sent between those participants doubling last year, according to new research from Trend Micro.     

TOPICS:
A "safe harbor" clause in the 1998 law called the Digital Millennium Copyright Act absolves websites of any legal liability for virtually all content posted on their services. The law, known as the DMCA, requires websites and other Internet service provid

Stolen Photos of Stars Find 'Safe Harbor' Online

September 4, 2014 12:29 pm | by Michael Liedtke, Associated Press | Comments

A "safe harbor" clause in the 1998 law called the Digital Millennium Copyright Act absolves websites of any legal liability for virtually all content posted on their services. The law, known as the DMCA, requires websites and other Internet service providers to remove a piece of content believed to be infringing on a copyright after being notified of a violation by the copyright owner.

TOPICS:
Advertisement
Apple has blamed a "very targeted attack" for the suspected breach of numerous celebrities' iCloud accounts, which resulted in nude photographs and videos being leaked to the 4chan image board. But some security experts have taken issue with Apple's expla

Is Apple iCloud Safe?

September 4, 2014 12:10 pm | by Mathew J. Schwartz, Gov Info Security | Comments

Apple has blamed a "very targeted attack" for the suspected breach of numerous celebrities' iCloud accounts, which resulted in nude photographs and videos being leaked to the 4chan image board. But some security experts have taken issue with Apple's explanation for the attacks. And they contend the company's iCloud service remains vulnerable to similar exploits.

TOPICS:
Device and data security will assume critical significance for companies adopting a bring you own device (BYOD) policy, especially with nearly 50 percent of companies having reported lost mobile handsets in the last year. According to IT services speciali

BYOD Policy Helps Avoid Major Security Breaches

September 3, 2014 11:57 am | by ITC Infotech | Comments

Device and data security will assume critical significance for companies adopting a bring you own device (BYOD) policy, especially with nearly 50 percent of companies having reported lost mobile handsets in the last year. According to IT services specialist ITC Infotech, lack of a stringent BYOD policy can lead to the risk of a major security breach.

TOPICS:
In a classic example of a ripple effect, a number of Namecheap’s users’   accounts have now been compromised in a brute-force attack, by hackers using   passwords previously stolen by Russian gang CyberVor.

Russian Gang's Billions of Stolen Credentials Resurface in New Attack

September 3, 2014 11:38 am | by Tara Seals, Infosecurity Magazine | Comments

In a classic example of a ripple effect, a number of Namecheap’s users’ accounts have now been compromised in a brute-force attack, by hackers using passwords previously stolen by Russian gang CyberVor.             

TOPICS:
When President Obama meets with other NATO leaders later this week, they are expected to ratify what seems, at first glance, a far-reaching change in the organization’s mission of collective defense: For the first time, a cyber attack on any of the 28 NAT

NATO Set to Pledge Joint Defense over Cyber Threats

September 3, 2014 11:22 am | by David Sanger, The New York Times | Comments

When President Obama meets with other NATO leaders later this week, they are expected to ratify what seems, at first glance, a far-reaching change in the organization’s mission of collective defense: For the first time, a cyber attack on any of the 28 NATO nations could be declared an attack on all of them, much like a ground invasion or an airborne bombing.

TOPICS:
As nude celebrity photos spilled onto the web over the weekend, blame for the   scandal has rotated from the hackers who stole the images to a researcher who   released a tool used to crack victims’ iCloud passwords to Apple. But one   step in the hackers

Police Tool Used to Steal Pics from Apple's iCloud

September 3, 2014 11:09 am | by Andy Greenberg, Wired | Comments

As nude celebrity photos spilled onto the web over the weekend, blame for the scandal has rotated from the hackers who stole the images to a researcher who released a tool used to crack victims’ iCloud passwords to Apple. But one step in the hackers’ sext-stealing playbook has been ignored — a piece of software designed to let cops and spies siphon data from iPhones, but is instead being used by criminals themselves.

TOPICS:
Hosted at the European Cybercrime Centre (EC3) at Europol, the Joint Cybercrime Action Taskforce (J-CAT), which is being piloted for six months, will coordinate international investigations with partners working side-by-side to take action against key cyb

Expert International Cybercrime Taskforce Tackles Online Crime

September 2, 2014 1:21 pm | by Help Net Security | Comments

Hosted at the European Cybercrime Centre (EC3) at Europol, the Joint Cybercrime Action Taskforce (J-CAT), which is being piloted for six months, will coordinate international investigations with partners working side-by-side to take action against key cybercrime threats and top targets, such as underground forums and malware, including banking Trojans.

TOPICS:
Security researchers have spotted what they believe to be a second pro-al Assad hacking group, dubbed the Syrian Malware Team, using a .NET RAT to attack targets.

Second Pro-government Hacking Group 'Syrian Malware Team' Uncovered

September 2, 2014 1:14 pm | by Phil Muncaster, Infosecurity Magazine | Comments

Security researchers have spotted what they believe to be a second pro-al Assad hacking group, dubbed the Syrian Malware Team, using a .NET RAT to attack targets.                         

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading