Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Tech Giants, Telcos Get OK to Release Stats on NSA Spying

January 28, 2014 9:28 am | by David Kravets, Wired | Comments

In President Obama’s speech recently outlining surveillance reforms, the president promised he would allow corporations like Google, Apple and Microsoft to be more transparent with their customers about NSA spying. Now, we have learned what that means.

TOPICS:

Leaky Mobile Apps Used to Harvest Data

January 28, 2014 8:59 am | by Infosecurity | Comments

Security experts have long warned that users should be more concerned about the sometimes excessive personal data that some apps take from their hosts. Now it seems that criminals and advertisers are not the only people interested in this information: NSA and GCHQ have been developing the ability to take advantage of leaky mobile apps.

TOPICS:

Bitcoin Operator Charged in Money Laundering Scheme

January 27, 2014 2:49 pm | by Emily Flitter, Reuters | Comments

The vice chairman of the Bitcoin Foundation, a trade group promoting the adoption of the digital currency, has been charged by U.S. prosecutors with conspiring to commit money laundering by helping to funnel cash to illicit online drugs bazaar Silk Road.

TOPICS:
Advertisement

Secure Webmail Site Seized by FBI

January 27, 2014 10:37 am | by Kevin Poulsen, Wired | Comments

While investigating a hosting company known for sheltering child porn last year the FBI incidentally seized the entire email database of a popular anonymous webmail service called TorMail. Now the FBI is tapping that vast trove of email in unrelated investigations.

TOPICS:

Multiple Hacker Arrests in Collaborative International Operation

January 27, 2014 9:28 am | by Infosecurity | Comments

The FBI has announced that it had arrested two operators of a US-based email hacking website, and three customers of foreign email hacking sites. Operators of foreign email hacking sites were arrested by national authorities in Romania, India and China in what is believed to be the first joint operation involving these four countries.

TOPICS:

Israeli Defense Computer Hacked via Tainted Email

January 27, 2014 9:17 am | by Allyn Fisher-Ilan and Jim Finkle, Reuters | Comments

Hackers broke into an Israeli defense ministry computer via an email attachment tainted with malicious software that looked like it had been sent by the country's Shin Bet secret security service, an Israeli cyber security firm says.     

TOPICS:

FBI Warns Retailers to Expect More Credit Card Breaches

January 24, 2014 10:07 am | by Jim Finkle and Mark Hosenball, Reuters | Comments

The FBI has warned U.S. retailers to prepare for more cyber attacks after discovering about 20 hacking cases in the past year that involved the same kind of malicious software used against Target Corp in the holiday shopping season.     

TOPICS:

Penetration Testing: Accurate or Abused?

January 24, 2014 9:56 am | by Steve Hunt, Help Net Security | Comments

Penetration testing (pen testing), also known as "ethical hacking," is an important and key step in reducing the risks of a security breach because it helps provide IT staff with an accurate view of the information system from an attackers point of view.

TOPICS:
Advertisement

Syrian Electronic Army Escalated Tactics Over 2013

January 24, 2014 9:47 am | by Infosecurity | Comments

The hacktivist group known as the Syrian Electronic Army was a particularly active adversary in the second half of 2013, and remains one of the top global threat actors to watch in the coming year as the Syrian conflict drags on — not least because of the group’s ability to morph its techniques to keep things interesting.

TOPICS:

'Most Hated Man on the Internet' Arrested

January 24, 2014 9:20 am | by Associated Press | Comments

A notorious "revenge porn" website operator and another California man have been charged with stealing nude photos from hundreds of hacked email accounts and posting the images online.                   

TOPICS:

Government Panel Urges End to Phone Data Spying

January 23, 2014 10:36 am | by Stephen Braun, Associated Press | Comments

A sharply divided government task force that reviewed the National Security Agency's surveillance program for four months has urged President Barack Obama to shut down the agency's bulk collection of phone data and purge its massive inventory of millions of Americans' calling records.

TOPICS:

Power Utility Substations at Risk

January 23, 2014 10:26 am | by Kelly Jackson Higgins, Dark Reading | Comments

Nearly 30 security vulnerabilities so far have been found in products using a popular ICS/SCADA communications protocol, prompting about half of the affected vendors to patch their products, and at least one vendor to pull its affected software from the market and urge its customers to instead install another one of its products.

TOPICS:

Chrome Bugs Allow Websites to Listen to Conversations

January 23, 2014 10:17 am | by Zelhka Zorn, Help Net Security | Comments

Several security flaws in the popular Google Chrome browser can be exploited to turn the computer into a surreptitious listening device, claims Israeli developer Tal Ater.                       

TOPICS:

'Spoiled Onions' on Tor Network

January 23, 2014 9:37 am | by Dan Goodin, Ars Technica | Comments

Computer scientists have identified almost two dozen computers that were actively working to sabotage the Tor privacy network by carrying out attacks that can degrade encrypted connections between end users and the websites or servers they visit.

TOPICS:

Backbone Security Expands World's Largest Digital Steganography Database

January 22, 2014 3:01 pm | by Backbone Security | Comments

Backbone Security has released the latest version of their Steganography Application Fingerprint Database (SAFDB), which now contains over 1,200 steganography applications. Developed in Backbone’s Steganography Analysis and Research Center (SARC), SAFDB is the world’s largest commercially available hash set exclusive to digital steganography applications.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading