Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Controlling Social Media Rumors During a Disaster or Terrorist Attack

April 4, 2014 10:59 am | by Warwick Business School | Comments

Authorities around the world should set up emergency communication teams to manage the amount of misinformation circulating on social media during disasters, terrorist attacks and other social crises.              

TOPICS:

Real Time Worldwide Interactive Cyberthreat Map

April 4, 2014 10:24 am | by Kaspersky Lab | Comments

Kaspersky Lab has launched an interactive cyberthreat map that visualizes cybersecurity incidents occurring worldwide in real time.                                 

TOPICS:

Quantum Cryptography for Mobile Phones

April 4, 2014 10:03 am | by Univ. of Bristol | Comments

Secure mobile communications underpin our society and through mobile phones, tablets and laptops we have become online consumers. The security of mobile transactions is obscure to most people but is absolutely essential if we are to stay protected from malicious online attacks, fraud and theft.

TOPICS:
Advertisement

Mobile POS Devices are Vulnerable to Attack

April 3, 2014 4:37 pm | by MWR InfoSecurity | Comments

Mobile Point of Sale (MPOS) devices can be easily hacked, leaving banks, retailers and millions of customers exposed to serious fraud around the world, global information security firm MWR InfoSecurity has revealed at the SyScan security conference in Singapore.

TOPICS:

Internet of Things becoming a New Favorite Malware Target

April 3, 2014 11:52 am | by Dan Goodin, Ars Technica | Comments

The past few days have revealed new data that suggests the recent upsurge in malware targeting routers is not only continuing, but it's spreading to digital video recorders (DVRs).                   

TOPICS:

A Third of PCs to become Cyber Crime Targets

April 3, 2014 10:00 am | by Infosecurity | Comments

As Microsoft readies the eulogy for Windows XP, data from security firm Trend Micro shows that nearly a third of PCs still run on the operating system — leaving a wide swath of the PC user base susceptible to cybercriminal exploits.  

TOPICS:

Army Reserve Soldiers Train in Cyber Defense Operations

April 2, 2014 3:21 pm | by Capt. Addie Randolph, DVIDS | Comments

Once a year, five battalions belonging to the Army Reserve Information Operations Command come together from across the U.S. to participate in their annual training. This year just over 200 soldiers participated in the training event, which took place March 22-29 at Fort Dix, N.J. 

TOPICS:

Judge Orders Mt Gox CEO to US for Questioning

April 2, 2014 10:35 am | by Tom Hals, Reuters | Comments

The chief executive of Japan's Mt. Gox, once the world's leading bitcoin exchange, was ordered to the United States to answer questions related to its U.S. bankruptcy case, filed after the company lost $400 million of customers' digital currency.

TOPICS:
Advertisement

US NSA and British GCHQ Spy on German Satcomms

April 2, 2014 10:23 am | by Zeljka Zorz, Help Net Security | Comments

Another week, another explosive revelation coming from Edward Snowden's archive of NSA documents. This time they reveal the widespread compromise of several German satellite communication providers by the hands of Britain's GCHQ intelligence service and the US NSA.

TOPICS:

Boxee.tv Hack Exposes Password Data, Messages

April 2, 2014 10:12 am | by Dan Goodin, Ars Technica | Comments

Hackers posted names, email addresses, message histories, and partially protected login credentials for more than 158,000 forum users of Boxee.tv.                             

TOPICS:

Cyber Criminals Seek Bargains

April 2, 2014 10:01 am | by Kelly Jackson Higgins, Dark Reading | Comments

Most cyber attacks today are waged by cost-conscious criminals who mostly repurpose malware and other techniques to get the most bang for their buck, a new study finds.                       

TOPICS:

Advanced Evasion Techniques and APTs Cost Businesses Millions

April 2, 2014 8:09 am | by Infosecurity | Comments

Misunderstandings, misinterpretation and ineffective safeguards in use by the security experts charged with protecting sensitive data have led to both controversy and confusion surrounding advanced evasion techniques (AETs), and the role that they play in advanced persistent threats (APTs).

TOPICS:

Federal Agents Pierce Tor Web-anonymity Tool

April 1, 2014 10:38 am | by Andrew Grossman, The Wall Street Journal | Comments

Law-enforcement agencies are increasingly finding ways to unmask users of a popular Web browser designed to hide identities and allow individuals to exist online anonymously.                     

TOPICS:

Deadbolt Comments on MH370 Digital Investigation

April 1, 2014 10:21 am | Deadbolt Forensics, LLC | Comments

Deadbolt Forensics has commented on the role that digital forensics has played during the investigation into the disappearance of Malaysian Airlines flight MH370.                         

TOPICS:

Wisconsin Police to Secretly Track Cellphone Locations

April 1, 2014 10:03 am | by Associated Press | Comments

Police in Wisconsin have at least two devices that secretly track cellphone locations in real time to target suspects or missing persons, according to a published report.                       

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading