Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Alleged Silk Road mastermind Ross Ulbricht (aka, Dread Pirate Roberts), has been indicted on three additional charges, including narcotics trafficking, distribution of narcotics by means of the internet, and conspiracy to traffic in fraudulent identificat

Silk Road Kingpin Faces Yet More Criminal Charges

August 27, 2014 10:28 am | by Tara Seals, Infosecurity Magazine | Comments

Alleged Silk Road mastermind Ross Ulbricht (aka, Dread Pirate Roberts), has been indicted on three additional charges, including narcotics trafficking, distribution of narcotics by means of the internet, and conspiracy to traffic in fraudulent identification documents.

TOPICS:
According to newly published documents, the National Security Agency has built a “Google-like” search interface for its vast database of metadata, and the agency shares it with dozens of other American intelligence agencies. The new documents are part of

NSA Increases Interagency Cooperation with Own Search Engine

August 26, 2014 11:00 am | by Cyrus Farivar. Ars Technica | Comments

According to newly published documents, the National Security Agency has built a “Google-like” search interface for its vast database of metadata, and the agency shares it with dozens of other American intelligence agencies. The new documents are part of the Snowden leaks and were first published on by The Intercept.

TOPICS:
Even before the academic semester starts, students from across the globe have begun registering for the largest set of student cybersecurity competitions in the world: the NYU Polytechnic School of Engineering Cyber Security Awareness Week (CSAW).

NYU Launches Largest Cybersecurity Student Contests

August 26, 2014 10:04 am | by NYU Polytechnic School of Engineering | Comments

Even before the academic semester starts, students from across the globe have begun registering for the largest set of student cybersecurity competitions in the world: the NYU Polytechnic School of Engineering Cyber Security Awareness Week (CSAW).

TOPICS:
Advertisement
Six months ago, NIST released version 1.0 of its voluntary Framework for Improving Critical Infrastructure Cybersecurity. The framework was developed with industry in a collaborative and open process over the course of a year, as directed by President Oba

NIST Seeks Info on User Experiences with Cybersecurity Framework

August 26, 2014 9:54 am | by NIST | Comments

Six months ago, NIST released version 1.0 of its voluntary Framework for Improving Critical Infrastructure Cybersecurity. The framework was developed with industry in a collaborative and open process over the course of a year, as directed by President Obama in Executive Order 13636. NIST is now seeking public feedback on the framework.

TOPICS:
To help digital forensic and incident response (DFIR) professionals take on any Apple case without hesitation, the SANS Institute has introduced the new FOR518: Mac Forensic Analysis course. This intense hands-on forensic analysis course will help Windows

SANS Introduces Apple, Mac and iDevice, Forensic Analysis Course

August 26, 2014 7:56 am | SANS Institute | Comments

To help digital forensic and incident response (DFIR) professionals take on any Apple case without hesitation, the SANS Institute has introduced the new FOR518: Mac Forensic Analysis course. This intense hands-on forensic analysis course will help Windows-based investigators broaden their analysis capabilities and achieve the confidence and knowledge needed to comfortably analyze any Mac or iOS system without hesitation. 

TOPICS:
A cyber attack at a firm that performs background checks for U.S. government employees compromised data of at least 25,000 workers, including some undercover investigators, and that number could rise, agency officials say.

US Undercover Investigators among Those Exposed in Data Breach

August 25, 2014 11:20 am | by Jim Finkle and Mark Hosenball, Reuters | Comments

A cyber attack at a firm that performs background checks for U.S. government employees compromised data of at least 25,000 workers, including some undercover investigators, and that number could rise, agency officials say.       

TOPICS:
The video of James Foley’s execution may have been staged, with the actual   murder taking place off-camera, it has emerged. Forensic analysis of the   footage of the journalist’s death has suggested that the British jihadist in   the film may have been t

Foley Murder Video 'May Have been Staged'

August 25, 2014 10:29 am | by Bill Gardner, The Telegraph | Comments

The video of James Foley’s execution may have been staged, with the actual murder taking place off-camera, it has emerged. Forensic analysis of the footage of the journalist’s death has suggested that the British jihadist in the film may have been the frontman rather than the killer.

TOPICS:
A team of researchers have identified a weakness believed to exist in Android, Windows and iOS mobile operating systems that could be used to obtain personal information from unsuspecting users. They demonstrated the hack in an Android phone.

Mobile OS Weakness Allows Apps to Steal Personal Information

August 25, 2014 9:47 am | by Sean Nealon, Univ. of California - Riverside | Comments

A team of researchers have identified a weakness believed to exist in Android, Windows and iOS mobile operating systems that could be used to obtain personal information from unsuspecting users. They demonstrated the hack in an Android phone.  

TOPICS:
Advertisement
Researchers from Tel Aviv University have demonstrated an attack against the GnuPG encryption software that enables them to retrieve decryption keys by touching exposed metal parts of laptop computers.

Stealing Encryption Keys through the Power of Touch

August 22, 2014 10:47 am | by Peter Bright, Ars Technica | Comments

Researchers from Tel Aviv University have demonstrated an attack against the GnuPG encryption software that enables them to retrieve decryption keys by touching exposed metal parts of laptop computers.             

TOPICS:
When APTs (Advanced Persistent Threats) are discovered, network security operations professionals are instantly under pressure to explain and resolve the problems swiftly. Without a robust understanding of the context, network traffic and content, SecOps

Know Your Advanced Persistent Threats' Unknowns

August 22, 2014 10:26 am | by Information Buzz Security | Comments

When APTs (Advanced Persistent Threats) are discovered, network security operations professionals are instantly under pressure to explain and resolve the problems swiftly. Without a robust understanding of the context, network traffic and content, SecOps professionals are often left to rely on informed guesses and not verifiable facts.

TOPICS:
The majority of cyber attacks on northern European targets come from machines in Russia, while China is the number one source of threats aimed at the US, according to new honeypot data collected by Alert Logic.

Europe Bombarded with Cyber Attacks from Russia

August 22, 2014 10:22 am | by Phil Muncaster, Infosecurity Magazine | Comments

The majority of cyber attacks on northern European targets come from machines in Russia, while China is the number one source of threats aimed at the US, according to new honeypot data collected by Alert Logic.           

TOPICS:

Digital Clues Leading the Hunt for ISIS Killer

August 22, 2014 9:52 am | by Jill Lawless, Associated Press | Comments

The Islamic militant in a video showing the death of American journalist James Foley took great care to disguise his identity, dressing head-to-toe in black, with a mask leaving only his eyes visible. But police and intelligence services in Britain and the United States have a plethora of clues as they scramble to identify him, from image analysis and voice-recognition software to social media postings and testimony from former captives.

TOPICS:
A security researcher has announced that the notorious OpenSSL bug, Heartbleed, was the initial point of entry for the attack on Community Health Systems (CHS) that netted 4.5 million identity records — but other researchers point out that Heartbleed is o

Heartbleed Not Only Reason for Health Systems Breach

August 21, 2014 10:51 am | by Sara Peters, Dark Reading | Comments

A security researcher has announced that the notorious OpenSSL bug, Heartbleed, was the initial point of entry for the attack on Community Health Systems (CHS) that netted 4.5 million identity records — but other researchers point out that Heartbleed is only the beginning of the problem.

TOPICS:
Computer security researchers TU Darmstadt/CASED in Germany and North Carolina State University in USA have developed a modification to the core Android operating system that allows developers and users to plug in new security enhancements. The new Androi

Researchers Develop Framework to Facilitate New Android Security Modules

August 21, 2014 10:41 am | by CASED | Comments

Computer security researchers from TU Darmstadt/CASED in Germany and North Carolina State University in USA have developed a modification to the core Android operating system that allows developers and users to plug in new security enhancements. The new Android Security Modules (ASM) framework aims to eliminate the bottleneck that prevents developers and users from taking advantage of new security tools.

TOPICS:
Man-in-the-middle (MITM) attacks are “wreaking havoc” on Android users because over two-thirds of the most popular apps on Google Play contain SSL vulnerabilities, according to new research from FireEye.

SSL Vulnerabilities Found in Most Popular Android Apps

August 21, 2014 10:22 am | by Infosecurity Magazine | Comments

Man-in-the-middle (MITM) attacks are “wreaking havoc” on Android users because over two-thirds of the most popular apps on Google Play contain SSL vulnerabilities, according to new research from FireEye.             

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading