Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Wired and Forbes reported recently that the two largest cellphone carriers in the United States, Verizon and AT&T, are adding the tracking number to their subscribers' Internet activity, even when users opt out.

Somebody's Already Using Verizon's ID to Track Users

November 4, 2014 10:43 am | by Julia Angwin and Jeff Larson, ProPublica | Comments

Wired and Forbes reported recently that the two largest cellphone carriers in the United States, Verizon and AT&T, are adding the tracking number to their subscribers' Internet activity, even when users opt out.     

TOPICS:
Twitter and Facebook are so important to militant groups that the U.S. technology giants should give security services greater access to allow Western governments to foil attacks, the head of Britain's eavesdropping agency said.

UK Spy Chief Says Terrorists Grow Networks with Social Media

November 4, 2014 10:22 am | by Guy Faulconbridge, Reuters | Comments

Twitter and Facebook are so important to militant groups that the U.S. technology giants should give security services greater access to allow Western governments to foil attacks, the head of Britain's eavesdropping agency said.      

TOPICS:
Facebook has never had much of a reputation for letting users hide their   identities online. But now the world’s least anonymous website has just   joined the Web’s most anonymous network.

Facebook Tor Users Anonymous to Everyone but Facebook

November 3, 2014 11:15 am | by Andy Greenberg, Wired | Comments

Facebook has never had much of a reputation for letting users hide their identities online. But now the world’s least anonymous website has just joined the Web’s most anonymous network.                   

TOPICS:
Advertisement
When an agency identifies and successfully responds to a cyber attack, it gains knowledge that can be used by others facing the same or similar threats. Because attackers often use similar strategies, tools, and methods against multiple organizations, sha

NIST Drafts Cyber Threat Info Sharing Guidance

November 3, 2014 10:43 am | by GCN | Comments

When an agency identifies and successfully responds to a cyber attack, it gains knowledge that can be used by others facing the same or similar threats. Because attackers often use similar strategies, tools, and methods against multiple organizations, shared threat intelligence can reduce the impact of future attacks.

TOPICS:
The Navy is embarking on a year-long effort to protect hardware and software servicewide, as the Internet of Things takes hold of everything from ship speakers to missile launchers.

Navy Becoming Cyber Ready

November 3, 2014 10:24 am | by Aliya Sternstein, Nextgov | Comments

The Navy is embarking on a year-long effort to protect hardware and software servicewide, as the Internet of Things takes hold of everything from ship speakers to missile launchers.                    

TOPICS:
Most modern cryptographic schemes rely on computational complexity for their security. In principle, they can be cracked, but that would take a prohibitively long time, even with enormous computational resources. There is, however, another notion of secur

Raising the Limits of Cryptography

November 3, 2014 10:02 am | by Larry Hardesty, MIT | Comments

Most modern cryptographic schemes rely on computational complexity for their security. In principle, they can be cracked, but that would take a prohibitively long time, even with enormous computational resources. There is, however, another notion of security.

TOPICS:
A Danish court has sentenced the Swedish founder of file-sharing site The Pirate Bay to 3½ years in prison after he was found guilty of hacking into a private company handling sensitive information for Danish authorities.

Pirate Bay Founder Sentenced for Hacking Danish Data

October 31, 2014 10:45 am | by Associated Press | Comments

A Danish court has sentenced the Swedish founder of file-sharing site The Pirate Bay to 3½ years in prison after he was found guilty of hacking into a private company handling sensitive information for Danish authorities.        

TOPICS:
Students supported through California State University, San Bernardino's SFS program are being educated in cyber intelligence to deal proactively with cyber threats — to predict malicious behavior before it happens. Doing so draws not only on a background

Cybersecurity Not Just about Hackers

October 31, 2014 10:22 am | by Maria Zacharias, The National Science Foundation | Comments

Students supported through California State University, San Bernardino's SFS program are being educated in cyber intelligence to deal proactively with cyber threats — to predict malicious behavior before it happens. Doing so draws not only on a background in computer and information science, but also on an understanding of human behavior and psychology and the political and economic environment.

TOPICS:
Advertisement
An attack by hackers on a White House computer network earlier this month was considered so sensitive that only a small group of senior congressional leaders were initially notified about it, U.S. officials say.

Only Top Legislators Informed of White House Cyber Breach

October 30, 2014 4:39 pm | by Mark Hosenball, Reuters | Comments

An attack by hackers on a White House computer network earlier this month was considered so sensitive that only a small group of senior congressional leaders were initially notified about it, U.S. officials say.           

TOPICS:
IBM has developed new high-speed analysis and criminal investigation software that is designed to uncover hidden criminal threats buried deep inside massive volumes of disparate corporate data.

IBM Big Data Uncovers Criminal Cyber Activity

October 30, 2014 4:27 pm | by IBM | Comments

IBM has developed new high-speed analysis and criminal investigation software that is designed to uncover hidden criminal threats buried deep inside massive volumes of disparate corporate data.                

TOPICS:
Most organizations are facing rising threats in their information security risk environment, but over a third have no real-time insight on cyber risks necessary to combat these threats.

Organizations Still Unprepared for Cyber Attacks

October 30, 2014 11:14 am | by EY | Comments

Most organizations are facing rising threats in their information security risk environment, but over a third have no real-time insight on cyber risks necessary to combat these threats.                   

TOPICS:
Cyber hits on ATMs are getting more frequent, but the authorities seem to be catching up: A man in the UK has been arrested in conjunction with a significant $2.6 million cash machine heist.

London Authorities Nab Suspect in $2.6M ATM Heist

October 30, 2014 10:31 am | by Tara Seals, Infosecurity Magazine | Comments

Cyber hits on ATMs are getting more frequent, but the authorities seem to be catching up: A man in the UK has been arrested in conjunction with a significant $2.6 million cash machine heist.                 

TOPICS:
More than 200 organizations and 400 cybersecurity professionals from 29 European countries are testing their readiness to counter cyber attacks in a day-long simulation, organized by the European Network and Information Security Agency (ENISA).

Biggest Cybersecurity Exercise Ever Happening in Europe

October 30, 2014 10:11 am | by Help Net Security | Comments

More than 200 organizations and 400 cybersecurity professionals from 29 European countries are testing their readiness to counter cyber attacks in a day-long simulation, organized by the European Network and Information Security Agency (ENISA). 

TOPICS:
Cyber crime costs the global economy an estimated $400 billion a year, and as it grows in scale and sophistication, law enforcement is having to do the same.

Law Enforcement's High-tech Battle to Stop Cyber Crime

October 30, 2014 9:37 am | by Maggie Lake, CNN | Comments

Cyber crime costs the global economy an estimated $400 billion a year, and as it grows in scale and sophistication, law enforcement is having to do the same. The U.S. secret service helped prevent over $1 billion in fraud losses from cyber crime last year, but it is up against skilled and organized international crime networks.

TOPICS:
In his career-ending extramarital affair that came to light in 2012, General David Petraeus used a stealthy technique to communicate with his lover Paula Broadwell: the pair left messages for each other in the drafts folder of a shared Gmail account.

Hackers Hiding Data in Gmail Drafts

October 29, 2014 10:39 am | by Andy Greenberg, Wired | Comments

In his career-ending extramarital affair that came to light in 2012, General David Petraeus used a stealthy technique to communicate with his lover Paula Broadwell: the pair left messages for each other in the drafts folder of a shared Gmail account. Now hackers have learned the same trick.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading