Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

InfoSec teams should expand their rapid incident detection and response capabilities to mobile devices that have access to sensitive data.

70 Percent of Internet of Things Devices Vulnerable to Hacking

August 4, 2014 9:01 am | Comments

Nearly three-quarters of all Internet of Things devices are susceptible to getting hacked or compromised, according to a recent study. The study, released by Hewlett-Packard (HP), examined 10 common smart devices, including thermostats, smart TVs and webcams. Each device had approximately 25 vulnerabilities.

TOPICS:
Rogue cellular towers and phony base stations long have been a tradition of researchers at Black Hat and DEF CON, who test and demonstrate how they can intercept or manipulate cellphones, but a team of researchers has found a deeper problem of major secur

Way for Phones to be Contolled is Built In

July 31, 2014 3:23 pm | by Kelly Jackson Higgins, Dark Reading | Comments

Rogue cellular towers and phony base stations long have been a tradition of researchers at Black Hat and DEF CON, who test and demonstrate how they can intercept or manipulate cellphones, but a team of researchers has found a deeper problem of major security vulnerabilities in the client control software running on the majority of mobile phones around the world.

TOPICS:
A study from Webroot on security and PC gamers details the security   perspective of players on their gaming systems. The study indicates that many   gamers either disable their security or remove it altogether, thereby sacrificing protection to maximiz

PC Gaming Vulnerable against Online Threats

July 31, 2014 3:12 pm | by Webroot | Comments

A study from Webroot on security and PC gamers details the security perspective of players on their gaming systems. The study indicates that many gamers either disable their security or remove it altogether, thereby sacrificing protection to maximize system performance and leaving themselves vulnerable to gaming-focused malware and cyber attacks.

Advertisement
It was May of 2012 at a security conference in Calgary, Alberta, when professor Ron Deibert heard a former high-ranking official suggest he should be prosecuted.

Inside Citizen Lab, the 'Hacker Hothouse'

July 31, 2014 2:59 pm | by Joshua Kopstein, Ars Technica | Comments

From exposing the espionage ring that hacked the Dalai Lama to uncovering the commercial spyware being sold to repressive regimes, Citizen Lab has played a pioneering role in combing the Internet to illuminate covert landscapes of global surveillance and censorship. At the same time, it's also taken the role of an ambassador, connecting the Internet's various stakeholders from governments to security engineers and civil rights activists.

TOPICS:
The same tools that help millions of Americans work from home are being exploited by cybercriminals to break into the computer networks of retailers like Target and Neiman Marcus.

Checking In from Home Leaves Entry for Hackers

July 31, 2014 2:48 pm | by Nicole Perlroth, The New York Times | Comments

The same tools that help millions of Americans work from home are being exploited by cyber criminals to break into the computer networks of retailers like Target and Neiman Marcus.                   

TOPICS:
Researchers at Dell SecureWorks have uncovered what they believe to be a Chinese hacking group specifically focused on stealing source code from video game companies, either in order to crack or cheat at particular games or to use in competing products.

Chinese Hackers Use APTs to Target Gaming Companies

July 31, 2014 10:01 am | by Infosecurity | Comments

Researchers at Dell SecureWorks have uncovered what they believe to be a Chinese hacking group specifically focused on stealing source code from video game companies, either in order to crack or cheat at particular games or to use in competing products.

TOPICS:
Gathering and understanding cyber intelligence is the work of BlackForest, a new open source intelligence gathering system developed by information security specialists at the Georgia Tech Research Institute (GTRI). By using such information to create a t

Threat Information System Warns of Impending Cyber Attacks

July 31, 2014 9:46 am | by Georgia Institute of Technology | Comments

Gathering and understanding cyber intelligence is the work of BlackForest, a new open source intelligence gathering system developed by information security specialists at the Georgia Tech Research Institute (GTRI). By using such information to create a threat picture, BlackForest helps corporations, government agencies and nonprofit organizations battle increasingly-sophisticated threats to their networks.

TOPICS:

Feds Admit Cooperation Remains Obstacle with Corporations, Cyber Threats

July 31, 2014 9:26 am | by Tom Fontaine, Trib LIVE | Comments

A key to reducing cyber crime is getting victims — often major corporations — to cooperate with authorities, two top federal law enforcement officials said during visits to Pittsburgh.                   

TOPICS:
Advertisement
Officials with the Tor privacy service have uncovered an attack that may have revealed identifying information or other clues of people operating or accessing anonymous websites and other services over a five-month span beginning in February.

Tor Attack Tried to Uncover Users for Five Months

July 30, 2014 3:11 pm | by Dan Goodin, Ars Technica | Comments

Officials with the Tor privacy service have uncovered an attack that may have revealed identifying information or other clues of people operating or accessing anonymous websites and other services over a five-month span beginning in February. 

TOPICS:
Cyber criminals have been launching DDoS attacks from Amazon cloud-based bots after gaining access via a known vulnerability in open source search engine Elasticsearch, according to researchers.

DDoS-ers Launch Attacks from Amazon EC2

July 30, 2014 2:59 pm | by Infosecurity | Comments

Cyber criminals have been launching DDoS attacks from Amazon cloud-based bots after gaining access via a known vulnerability in open source search engine Elasticsearch, according to researchers.               

TOPICS:
If you’re making a phone call with your iPhone, you used to have two options: Accept the notion that any wiretapper, hacker or spook can listen in on your conversations, or pay for pricey voice encryption software. As of today there’s a third option.

iPhone App Makes Free, Encrypted Calls

July 30, 2014 9:55 am | by Andy Greenberg, Wired | Comments

If you’re making a phone call with your iPhone, you used to have two options: Accept the notion that any wiretapper, hacker or spook can listen in on your conversations, or pay for pricey voice encryption software. As of today there’s a third option.

TOPICS:
In an interview with former National Security Agency Director General Keith Alexander, Foreign Policy's Shane Harris learned that Alexander plans to file “at least” nine patent applications — “and possibly more" — pertaining to technology for detecting ne

Former NSA Director to File Cybersecurity Patents in the Private World

July 30, 2014 9:08 am | by Megan Guess, Ars Technica | Comments

In an interview with former National Security Agency Director General Keith Alexander, Foreign Policy's Shane Harris learned that Alexander plans to file “at least” nine patent applications — “and possibly more" — pertaining to technology for detecting network intruders.

TOPICS:
While the word “forensics” might conjure up images of collecting hair or fingerprints from crime scenes, the scope of forensic science extends beyond the physical into almost any realm. If you need to discover the weather patterns in the past, you need so

The Budding Science of Chatroom Forensics

July 29, 2014 4:34 pm | by Ben Richmond. Motherboard | Comments

While the word “forensics” might conjure up images of collecting hair or fingerprints from crime scenes, the scope of forensic science extends beyond the physical into almost any realm. If you need to discover the weather patterns in the past, you need some forensic meteorology. Forensic accounting uncovers book-cookery. And down in Australia, they're working on forensic text comparison in order to catch pedophiles.

TOPICS:
High-level Chinese hackers recently tried to break into a key Canadian computer system, forcing Ottawa to isolate it from the main government network, a senior official said on Tuesday.

Canada Says China Tried to Hack into Key Computer System

July 29, 2014 11:12 am | by Reuters | Comments

High-level Chinese hackers recently tried to break into a key Canadian computer system, forcing Ottawa to isolate it from the main government network, a senior official said on Tuesday.                   

TOPICS:
Federal Chief Information Security Officers (CISOs) and information security executives face a number of challenges in today's dynamic, fast-paced environment.

How to Build a Federal Information Security Team

July 29, 2014 10:01 am | by (ISC)2 Writers Bureau, Information Week | Comments

Federal Chief Information Security Officers (CISOs) and information security executives face a number of challenges in today's dynamic, fast-paced environment. These challenges include advanced persistent threats, system vulnerabilities, and regulatory compliance, to name a few.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading