Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

The distinction between real-world crime and cyber crime is becoming increasingly blurred. In the past, thieves, robbers and fraudsters would rely on knives and guns to get the job done; today they are more likely to use phishing scams, denial-of-service

Traditional Crime is Coming to Cyberspace

September 30, 2014 11:20 am | by Sophie Curtis, The Telegraph | Comments

The distinction between real-world crime and cyber crime is becoming increasingly blurred. In the past, thieves, robbers and fraudsters would rely on knives and guns to get the job done; today they are more likely to use phishing scams, denial-of-service attacks and trojans.

TOPICS:
Card data of Supervalu and Albertsons shoppers may be at risk in another hack. The companies said that in late August or early September, malicious software was installed on networks that process credit and debit card transactions at some of their stores.

Another Card System Hack at Supervalu, Albertsons

September 30, 2014 10:53 am | by Associated Press | Comments

Card data of Supervalu and Albertsons shoppers may be at risk in another hack. The companies said that in late August or early September, malicious software was installed on networks that process credit and debit card transactions at some of their stores.

TOPICS:
A Pakistani man has been indicted in the Eastern District of Virginia for allegedly conspiring to advertise and sell StealthGenie, a spyware application (app) that could monitor calls, texts, videos and other communications on mobile phones without detect

Pakistani Man Indicted for Selling Spyware App

September 30, 2014 10:25 am | by DoJ | Comments

A Pakistani man has been indicted in the Eastern District of Virginia for allegedly conspiring to advertise and sell StealthGenie, a spyware application (app) that could monitor calls, texts, videos and other communications on mobile phones without detection. This marks the first-ever criminal case concerning the advertisement and sale of a mobile device spyware app.  

TOPICS:
Advertisement
Days after GM announced the appointment of a chief security officer, automotive cybersecurity has gotten another boost with a $4 million Series A funding shot for car-focused Argus Cyber Security.

Investors Drive into Car Cybersecurity

September 30, 2014 10:06 am | by Tara Seals, Infosecurity Magazine | Comments

Days after GM announced the appointment of a chief security officer, automotive cybersecurity has gotten another boost with a $4 million Series A funding shot for car-focused Argus Cyber Security.               

TOPICS:
Apple has finally released a security update for OS X that will close up the critical remote code execution Shellshock bug found in the GNU Bash UNIX shell.

Apple Patches Shellshock Bug in OS X

September 30, 2014 9:51 am | by Zeljka Zorz, Help Net Security | Comments

Apple has finally released a security update for OS X that will close up the critical remote code execution Shellshock bug found in the GNU Bash UNIX shell.                           

TOPICS:
Security experts are urging firms to patch the Shellshock bug as soon as possible, after spotting a “significant amount” of malicious traffic exploiting the Bash vulnerability made public recently.

Malicious Shellshock Traffic Invades the Web

September 29, 2014 10:28 am | by Phil Muncaster, Infosecurity Magazine | Comments

Security experts are urging firms to patch the Shellshock bug as soon as possible, after spotting a “significant amount” of malicious traffic exploiting the Bash vulnerability made public recently.               

TOPICS:
Disgruntled workers are increasingly exacting their revenge on their employers by using their access to company computers to engage in cyber sabotage, the FBI is warning. Others are using their access to extort money from their employers by threatening sa

FBI Warns of Rising Cyber Sabotage, Extortion by Disgruntled Employees

September 29, 2014 10:05 am | by Sean Higgins, Washington Examiner | Comments

Disgruntled workers are increasingly exacting their revenge on their employers by using their access to company computers to engage in cyber sabotage, the FBI is warning. Others are using their access to extort money from their employers by threatening sabotage.

TOPICS:

Organized Crime Opting for Hidden Internet Service Industry

September 29, 2014 9:51 am | by Europol | Comments

The 2014 iOCTA (Internet Organised Crime Threat Assessment), published by Europol's European Cybercrime Centre (EC3), describes an increased commercialization of cyber crime. A service-based criminal industry is developing, in which specialists in the virtual underground economy develop products and services for use by other criminals. 

TOPICS:
Advertisement
The US financial services industry is finally getting tough on cybercrime, with the announcement of a new body to be tasked with developing threat intelligence products.

US Banks Get Serious about Security Information Sharing

September 26, 2014 10:40 am | by Phil Muncaster, Infosecurity Magazine | Comments

The US financial services industry is finally getting tough on cyber crime, with the announcement of a new body to be tasked with developing threat intelligence products.                       

TOPICS:
FBI Director James B. Comey sharply criticized Apple and Google recently for developing forms of smartphone encryption so secure that law enforcement officials cannot easily gain access to information stored on the devices — even when they have valid sear

FBI Blasts Apple, Google for Blocking Phones from Police Investigation

September 26, 2014 10:13 am | by Craig Timberg and Greg Miller, The Washington Post | Comments

FBI Director James B. Comey sharply criticized Apple and Google recently for developing forms of smartphone encryption so secure that law enforcement officials cannot easily gain access to information stored on the devices — even when they have valid search warrants.

TOPICS:
With a bug as dangerous as the “shellshock” security vulnerability discovered recently, it takes less than 24 hours to go from proof-of-concept to pandemic.

Hackers Already Using Shellshock Bug to Launch Botnet Attacks

September 26, 2014 9:56 am | by Andy Greenberg, Wired | Comments

With a bug as dangerous as the “shellshock” security vulnerability discovered recently, it takes less than 24 hours to go from proof-of-concept to pandemic.                           

TOPICS:
A security vulnerability in the GNU Bourne Again Shell (Bash), the command-line shell used in many Linux and Unix operating systems, could leave systems running those operating systems open to exploitation by specially crafted attacks.

Bug in Bash Shell Creates Security Hole for Linux and Unix

September 25, 2014 10:19 am | by Sean Gallagher, Ars Technica | Comments

A security vulnerability in the GNU Bourne Again Shell (Bash), the command-line shell used in many Linux and Unix operating systems, could leave systems running those operating systems open to exploitation by specially crafted attacks.    

TOPICS:
In 1960, an IBM engineer named Forrest Parry was developing a new type of ID card for the CIA when he had an epiphany: Why not make each card a tiny data storage device in and of itself? He cut a short length of half-inch wide magnetic tape from a reel an

Why the Heyday of Credit Card Fraud is Almost Over

September 25, 2014 9:56 am | by Kevin Poulsen, Wired | Comments

In 1960, an IBM engineer named Forrest Parry was developing a new type of ID card for the CIA when he had an epiphany: Why not make each card a tiny data storage device in and of itself? He cut a short length of half-inch wide magnetic tape from a reel and wrapped it around a blank plastic card, secured it with Scotch tape, and then, at his wife’s suggestion, pressed it on with a warm iron. The magnetic stripe card was born.

TOPICS:
A new toolkit known as Spike is living up to its name by fomenting a series of powerful distributed denial of service (DDoS) attacks. Its specialty is helping malicious actors to build bigger DDoS botnets by targeting a wider range of Internet-capable dev

Spike DDoS Kit Driving 'Huge' Multi-Vector Attacks

September 25, 2014 9:13 am | by Tara Seals, Infosecurity Magazine | Comments

A new toolkit known as Spike is living up to its name by fomenting a series of powerful distributed denial of service (DDoS) attacks. Its specialty is helping malicious actors to build bigger DDoS botnets by targeting a wider range of Internet-capable devices. And that in turn drives…wait for it…a ‘spike’ in traffic.

TOPICS:
Your medical information is worth 10 times more than your credit card number on the black market. Security experts say cyber criminals are increasingly targeting the $3 trillion U.S. healthcare industry, which has many companies still reliant on aging com

Medical Records Worth More to Hackers Credit Cards

September 25, 2014 9:05 am | by Caroline Humer and Jim Finkle, Reuters | Comments

Your medical information is worth 10 times more than your credit card number on the black market. Security experts say cyber criminals are increasingly targeting the $3 trillion U.S. healthcare industry, which has many companies still reliant on aging computer systems that do not use the latest security features.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading