Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

ICE, International Law Enforcement Agencies Seize Domains on Cyber Monday

December 3, 2013 10:06 am | by ICE | Comments

U.S. Immigration and Customs Enforcement's (ICE) Homeland Security Investigations (HSI) teamed with 10 foreign law enforcement agencies to seize hundreds of domain names that were illegally selling counterfeit merchandise online to unsuspecting consumers. The 706 domain names seized were set up to dupe consumers into unknowingly buying counterfeit goods as part of the holiday shopping season.

TOPICS:

Why Salted Hash is as Good for Passwords as for Breakfast

December 3, 2013 9:53 am | by William Jackson, GCN | Comments

Passwords remain the primary means for online authentication and must be protected when stored on a server. Encryption is an option, but it has an inherent weakness in this application because the server authenticating the password must have the key to decrypt it. Hashing is a better option, especially with the judicious use of salt.

TOPICS:

Hacker of Koch Industries Website Sentenced in Kansas

December 3, 2013 8:48 am | by Kevin Murphy, Reuters | Comments

A Wisconsin man was sentenced on Monday to two years probation after he admitted taking part in a cyber attack sponsored by the hacker group Anonymous against Kansas conglomerate Koch Industries in February 2011, federal prosecutors said.   

TOPICS:
Advertisement

NSA Spied On Porn Habits to Discredit 'Radicalizers'

December 2, 2013 12:21 pm | by Glenn Greenwald, Ryan Gallagher and Ryan Grim, The Huffington Post | Comments

The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. 

TOPICS:

New Linux Worm Targets Routers, Cameras, 'Internet of Things' Devices

December 2, 2013 11:57 am | by Dan Goodin, Ars Technica | Comments

Researchers have discovered a Linux worm capable of infecting a wide range of home routers, set-top boxes, security cameras, and other consumer devices that are increasingly equipped with an Internet connection.           

TOPICS:

The True Cost of Cyber Crime

December 2, 2013 11:49 am | by Vic Winkler, Help Net Security | Comments

From a cybercrime perspective, the opportunities are boundless: Seemingly everything has a computer in it, cars and pacemakers included. It’s almost certain that the sophistication of exploits and attacks will increase, and that new exploit modes will surface with the ongoing computing and mobility revolution.

TOPICS:

Nissan Offers Forensics Help to Tennessee Sheriff

December 2, 2013 10:12 am | by Kevin Walters, The Tennessean | Comments

Up to five Nissan North America information security employees could also do double duty as reserve sheriff’s deputies, assisting investigators on forensics cases as part of a first-ever arrangement between the automaker and the Williamson County Sheriff’s Department.

TOPICS:

AutoCAD Malware Targets Industrial Espionage

November 26, 2013 6:38 pm | by Infosecurity | Comments

Historically, AutoCAD malware is very rare, although not completely unheard of. A new bug is now making the rounds, targeting these graphics and engineering platforms with exploits targeting old vulnerabilities. The goal is industrial espionage, but it could take a multi-layer infection to do it.

TOPICS:
Advertisement

Beyond Encryption: Stronger Security for Wireless Communications

November 26, 2013 5:27 pm | by Technische Universität München | Comments

Researchers have proven that wireless communications can be made more secure through a novel approach based on information theory. Their strategy for defeating eavesdroppers, which focuses on the so-called physical layer of communications systems, offers advantages over higher-level techniques such as encryption. 

TOPICS:

The Means and Motivations behind Backdoor Hardware Attacks

November 26, 2013 2:56 pm | by Pierluigi Paganini, The State of Security | Comments

Hardware attacks aren’t exclusive to state-sponsored operations. Criminal organizations could be interested to commercialize counterfeiting products or steal sensitive information to resell. Asian countries are the main areas where manufacturers have production plants. But cheap production costs could hide serious threats.

TOPICS:

EU Demands Protection against US Data surveillance

November 26, 2013 2:40 pm | by John O'Donnell, Reuters | Comments

The European Commission called on Tuesday for new protection for Europeans under United States' law against misuse of personal data, in an attempt to keep in check the U.S. surveillance revealed by former NSA contractor Edward Snowden.    

TOPICS:

Bitcoin Payment Processor Breached - $1M Stolen

November 26, 2013 10:02 am | by Infosecurity | Comments

BIPS, based in Copenhagen, Denmark and one of Europe's largest bitcoin payment processors, was breached last week. 1,295 bitcoins, worth around $1,000,000, were stolen. It is thought a two-stage attack — DDoS followed by hack — was employed.

TOPICS:

Newtown Shooter Report of Online Plans Struck Down

November 26, 2013 9:50 am | by Associated Press | Comments

Adam Lanza may have hinted at his deadly plans online in the days before last year's Sandy Hook Elementary School massacre. In documents that were part of a report released Monday, authorities say a Texas woman contacted Hartford police the day of the December 14 attack to say her son had interacted with someone while playing a videogame 20 hours earlier who said there would be a school shooting.

TOPICS:

Spies Worry over 'Doomsday' Cache

November 26, 2013 9:41 am | by Mark Hosenball, Reuters | Comments

British and U.S. intelligence officials say they are worried about a "doomsday" cache of highly classified, heavily encrypted material they believe former National Security Agency contractor Edward Snowden has stored on a data cloud.     

TOPICS:

Crime is Up and Mayor Blames iPhone Thieves

November 26, 2013 9:29 am | by Michael Grynbaum, The New York Times | Comments

Major crime in New York City inched up this year, and Mayor Michael Bloomberg fingered the culprit: too many iPhones and iPads were being swiped. A rise in thefts of shiny Apple products accounted for the slight increase in the city’s annual crime index, a statistic that covers a number of felonies, including murder, grand larceny and robbery.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading