Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Wireless Hack Pops a Car’s Locks in Minutes

August 7, 2014 9:27 am | Comments

As part of a talk on the insecurity of wireless devices at the Black Hat security conference later this week, Cesare plans to reveal a technique that could allow anyone to spoof the signal from a wireless key fob and unlock a car with no physical trace, using a codebreaking attack that takes as little as a few minutes to perform. 

TOPICS:

Bill Would Allow Warrants to Be Issued by Telephone

August 7, 2014 9:16 am | Comments

Tennessee prosecutors want to move the way search warrants are issued out of the 20th century. At issue is a bill that would allow a magistrate or judge to issue a search warrant by telephone or “other reliable electronic means.”  

TOPICS:
Microsoft's Internet Explorer (IE) has become the most patched software   product, receiving more security patches in the first six months of this year   than Adobe or Oracle software, a report by Bromium Labs has found.

Tool to Thwart Cyber-Attacks

August 6, 2014 11:27 am | Comments

Cybersecurity researchers at the Georgia Tech Research Institute are developing a tool that amasses information from the Internet to give organizations an early warning of a pending cyber-attack. The system, known as BlackForest, scrapes and analyzes information culled from a variety of online sources to detect potential attacks. 

TOPICS:
Advertisement

FBI Employs Drive-by Download

August 6, 2014 11:20 am | Comments

Security experts call it a “drive-by download”: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes. Now the technique is being adopted by a different kind of a hacker—the kind with a badge.

TOPICS:

Hacking Voice Mail Systems Presents New Threat

August 6, 2014 11:08 am | Comments

Better Business Bureau (BBB) serving Nebraska, South Dakota, The Kansas Plains and Southwest Iowa is warning about a relatively new kind of voice mail fraud that allows hackers to use a voice mail system and the default password to accept calls without the knowledge or permission of the business or the consumer.

TOPICS:

Russian Hackers Amass Over a Billion Internet Passwords

August 6, 2014 11:04 am | Comments

A Russian crime ring has amassed the largest known collection of stolen Internet credentials, including 1.2 billion user name and password combinations and more than 500 million email addresses, security researchers say.              

TOPICS:

New Army General to Head Cyber Center at Fort Gordon

August 5, 2014 9:15 am | Comments

The Army’s Cyber Center of Excellence is getting a new commanding general, the chief of staff announced. Maj. Gen. Stephen Fogarty will be assigned as commanding general at the center and of Fort Gordon. He will replace Maj. Gen. LaWarren Patterson, who was reassigned as deputy commanding general for operations and chief of staff, Installation Management Command, at Joint Base San Antonio, Texas.

Leaked Docs Reveal Power of FinFisher

August 5, 2014 8:56 am | Comments

A string of documents detailing the operations and effectiveness of the FinFisher suite of surveillance platforms appears to have been leaked. The documents, some dated 4 April this year, detail the anti-virus detection rates of the FinFisher spyware which German based Gamma Group sold to governments and law enforcement agencies.

TOPICS:
Advertisement

Hacker Claims Passenger Jet Communications Vulnerable to Attack

August 5, 2014 8:26 am | Comments

Cybersecurity researcher Ruben Santamarta says he has figured out how to hack the satellite communications equipment on passenger jets through their WiFi and inflight entertainment systems - a claim that, if confirmed, could prompt a review of aircraft security.

TOPICS:

Expanding Cybersecurity and Privacy Research

August 5, 2014 8:14 am | Comments

The National Science Foundation's (NSF) Secure and Trustworthy Cyberspace (SaTC) program has announced two new center-scale "Frontier" awards to support large, multi-institution projects that address grand challenges in cybersecurity science and engineering with the potential for broad economic and scientific impact.  

TOPICS:

Google Gives Police Child Pornography Evidence

August 5, 2014 7:41 am | by Conor Dougherty | Comments

Federal law requires people and companies to report child exploitation when they see it. This includes Google, whose automated eyes tipped law enforcement about a Houston-area man whom the police say was using the company’s Gmail service to email pornographic images of a child.

TOPICS:

Young Hacker Charged with Crimes in Prepaid Card Scheme

August 4, 2014 9:53 am | Comments

When Muneeb Akhter first graduated from George Mason University at age 19 with a Master’s degree in computer engineering, behind bars is probably one of the last places he thought he would end up. The dreams of what that academic achievement might bring him were quickly dashed however, after the white-hat hacker was caught scheming prepaid debit card providers out of thousands of dollars.

TOPICS:

Special Cyber Crime Team

August 4, 2014 9:47 am | Comments

City police in Surat, India, will soon have a dedicated group of cops to fight the menace of cyber crimes. The cops in the group would need to clear a certification examination to become eligible to carry out cyber crime-related investigation. Each police station in the city will have experts to investigate internet-related crimes.

TOPICS:

Computer Virus Catalog

August 4, 2014 9:15 am | Comments

The Computer Virus Catalog is a compilation of some of the deadliest computer viruses in history. The catalog is the brainchild of curator Bas van de Poel, a Dutch designer who's worked on advertising campaigns for Converse and Lego, among others. 

TOPICS:

Hacking the Hacker

August 4, 2014 9:06 am | Comments

A new Facebook scam lures users by providing a guaranteed access to anyone’s account in three easy steps. But following the steps make users hack their own page, via a method termed as Self-XXS, which makes anyone who attempts the guide vulnerable to new scam and phishing campaigns.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading