Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Criminals have always done their best to use new technology to their advantage and the rapid development of new digital technologies and online markets has provided the criminal entrepreneur with as much opportunity for innovation as their legitimate coun

In the Web's Hidden Darknet, Criminal Enterprise is Thriving

October 3, 2014 10:16 am | by Daniel Prince, Lancaster University | Comments

Criminals have always done their best to use new technology to their advantage and the rapid development of new digital technologies and online markets has provided the criminal entrepreneur with as much opportunity for innovation as their legitimate counterpart.

It’s been just two months since researcher Karsten Nohl demonstrated an   attack he called BadUSB, showing that it’s possible to corrupt any USB device   with insidious, undetectable malware. Researchers have showed that they’ve reverse engineered the s

Unpatchable USB Malware is on the Loose

October 3, 2014 9:53 am | by Andy Greenberg, Wired | Comments

It’s been just two months since researcher Karsten Nohl demonstrated an attack he called BadUSB, showing that it’s possible to corrupt any USB device with insidious, undetectable malware. Researchers have showed that they’ve reverse engineered the same USB firmware as Nohl’s SR Labs, reproducing some of Nohl’s BadUSB tricks. And unlike Nohl, the hacker pair has also published the code for those attacks on Github.

TOPICS:
Researchers have spotted new Mac malware in the wild which uses Reddit to connect with its command and control (C&C) servers. Russian security firm Dr Web claimed that the backdoor malware has already infected 17,000 Macs.

New Mac Malware Uses Reddit to Communicate

October 3, 2014 9:37 am | by Phil Muncaster, Infosecurity Magazine | Comments

Researchers have spotted new Mac malware in the wild which uses Reddit to connect with its command and control (C&C) servers. Russian security firm Dr Web claimed that the backdoor malware has already infected 17,000 Macs.       

Advertisement
China appears to be rolling out the big guns in an attempt to censor content and snoop on pro-democracy activists in Hong Kong, after Yahoo appeared to suffer a Man in the Middle attack and researchers spotted new mobile trojans doing the rounds.

China Fires Mobile Trojans at HK Protestors as Crowds Surge

October 2, 2014 10:46 am | by Phil Muncaster, Infosecurity Magazine | Comments

China appears to be rolling out the big guns in an attempt to censor content and snoop on pro-democracy activists in Hong Kong, after Yahoo appeared to suffer a Man in the Middle attack and researchers spotted new mobile trojans doing the rounds.

TOPICS:
The Federal Bureau of Investigation will soon open its Malware Investigator   portal to the private sector. Malware Investigator, which the agency began   developing in 2013 based on the success of its Binary Analysis Characterization and Storage System

FBI to Open Up Malware Portal to Private Sector

October 2, 2014 10:31 am | by Patricio Robles, ProgrammableWeb | Comments

The Federal Bureau of Investigation will soon open its Malware Investigator portal to the private sector. Malware Investigator, which the agency began developing in 2013 based on the success of its Binary Analysis Characterization and Storage System, is an automated analysis and repository system for suspected malware. 

TOPICS:
Mere days after a government crackdown on a spyware manufacturer comes the startling revelation that law enforcement agencies have been purchasing commercial spyware themselves and handing it out to the public for free.

Police are Handing Out Spyware to Parents

October 2, 2014 9:56 am | by Kim Zetter, Wired | Comments

Mere days after a government crackdown on a spyware manufacturer comes the startling revelation that law enforcement agencies have been purchasing commercial spyware themselves and handing it out to the public for free.         

TOPICS:
The National Institute of Standards and Technology (NIST) has published its NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0, a document that reflects advances in smart grid technologies and developments from NIST’s collab

NIST Releases Final Version of Smart Grid Framework, Update 3.0

October 2, 2014 9:25 am | by NIST | Comments

The National Institute of Standards and Technology (NIST) has published its NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0, a document that reflects advances in smart grid technologies and developments from NIST’s collaborative work with industry stakeholders. Revisions to its guidelines for smart grid cybersecurity are available as well.

TOPICS:
Interpol, the world's largest police organization, is opening a center in Singapore focused on fighting cyber crime, which many countries, it says, are poorly equipped to contain.

Interpol Opens Singapore Center to Fight Cyber Crime

October 2, 2014 8:54 am | by Theadora D'Cruz, Reuters | Comments

Interpol, the world's largest police organization, is opening a center in Singapore focused on fighting cyber crime, which many countries, it says, are poorly equipped to contain.                    

TOPICS:
Advertisement
President Vladimir Putin said on Wednesday he would not consider restricting Internet access for Russian users but warned of a sharp rise in cyber attacks on state domains since the Ukraine crisis began.

Putin Won't Curb Internet Access despite Cyber Attacks

October 1, 2014 10:35 am | by Reuters | Comments

President Vladimir Putin said on Wednesday he would not consider restricting Internet access for Russian users but warned of a sharp rise in cyber attacks on state domains since the Ukraine crisis began.             

TOPICS:
Viruses and worms have each had their day in the spotlight. Remote-access Trojans, which allow a hacker to open and maintain a secret backdoor on infected systems, have had their reign as well. These days, though, point-of-sale RAM scrapers are what’s mak

The Sneaky Tools Behind the Latest Credit Card Hacks

October 1, 2014 10:26 am | by Kim Zetter, Wired | Comments

Viruses and worms have each had their day in the spotlight. Remote-access Trojans, which allow a hacker to open and maintain a secret backdoor on infected systems, have had their reign as well. These days, though, point-of-sale RAM scrapers are what’s making the news.

TOPICS:
US Attorney General Eric Holder has become the latest senior official to argue against stronger privacy enhancing encryption on smartphones, claiming it has emboldened online criminals and child abusers.

Attorney General Slams Strong Phone Encryption

October 1, 2014 10:03 am | by Phil Muncaster, Infosecurity Magazine | Comments

US Attorney General Eric Holder has become the latest senior official to argue against stronger privacy enhancing encryption on smartphones, claiming it has emboldened online criminals and child abusers.             

TOPICS:
Four members of an international computer hacking ring have been charged with breaking into computer networks of prominent technology companies and the U.S. Army and stealing more than $100 million in intellectual property and other proprietary data.

Four Hackers Indicted for Stealing Gaming Technology, Army Software

October 1, 2014 9:41 am | by DoJ | Comments

Four members of an international computer hacking ring have been charged with breaking into computer networks of prominent technology companies and the U.S. Army and stealing more than $100 million in intellectual property and other proprietary data.

TOPICS:
The distinction between real-world crime and cyber crime is becoming increasingly blurred. In the past, thieves, robbers and fraudsters would rely on knives and guns to get the job done; today they are more likely to use phishing scams, denial-of-service

Traditional Crime is Coming to Cyberspace

September 30, 2014 11:20 am | by Sophie Curtis, The Telegraph | Comments

The distinction between real-world crime and cyber crime is becoming increasingly blurred. In the past, thieves, robbers and fraudsters would rely on knives and guns to get the job done; today they are more likely to use phishing scams, denial-of-service attacks and trojans.

TOPICS:
Card data of Supervalu and Albertsons shoppers may be at risk in another hack. The companies said that in late August or early September, malicious software was installed on networks that process credit and debit card transactions at some of their stores.

Another Card System Hack at Supervalu, Albertsons

September 30, 2014 10:53 am | by Associated Press | Comments

Card data of Supervalu and Albertsons shoppers may be at risk in another hack. The companies said that in late August or early September, malicious software was installed on networks that process credit and debit card transactions at some of their stores.

TOPICS:
A Pakistani man has been indicted in the Eastern District of Virginia for allegedly conspiring to advertise and sell StealthGenie, a spyware application (app) that could monitor calls, texts, videos and other communications on mobile phones without detect

Pakistani Man Indicted for Selling Spyware App

September 30, 2014 10:25 am | by DoJ | Comments

A Pakistani man has been indicted in the Eastern District of Virginia for allegedly conspiring to advertise and sell StealthGenie, a spyware application (app) that could monitor calls, texts, videos and other communications on mobile phones without detection. This marks the first-ever criminal case concerning the advertisement and sale of a mobile device spyware app.  

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading