Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Cybersecurity Remains a Gray Area for NATO

August 15, 2014 11:41 am | by Tom Risen, U.S. News & World Report | Comments

The North Atlantic Treaty Organization is expected to update its charter in September to address cybersecurity while leaving open the question of whether hacks count as an attack on its member states that could start a war. Leaving the definition open could cool fears about whether hackers could start a war.

TOPICS:

Mathematical Obfuscation against Hackers is Focus of New Cybersecurity Center

August 15, 2014 11:21 am | by Jeremy Hsu, IEEE Spectrum | Comments

Turning computer code into a kind of math puzzle may hold the key to protecting software from hackers. A consortium of universities developing the idea, called mathematical obfuscation, recently received a $5 million grant from the U.S. government as part of a broader cybersecurity initiative.

TOPICS:
Secure Channels Inc. has announced that none of the 155 hackers at the recent Black Hat USA 2014 Conference in Las Vegas who participated in a “Can You Break This” contest were able to hack the company’s new patented PKMS2 Encryption Technology.

Black Hat Hackers Fail to Crack Encryption Tech

August 15, 2014 11:02 am | by Secure Channels Inc. | Comments

Secure Channels Inc. has announced that none of the 155 hackers at the recent Black Hat USA 2014 Conference in Las Vegas who participated in a “Can You Break This” contest were able to hack the company’s new patented PKMS2 Encryption Technology.

TOPICS:
Advertisement
Mixing upper and lower case letters, numbers and special characters doesn’t make passwords any harder for hackers to crack, only increasing the number of characters does, according to new research from Trustwave.

Longer Passwords are Harder to Crack

August 15, 2014 10:36 am | by Phil Muncaster, Infosecurity Magazine | Comments

Mixing upper and lower case letters, numbers and special characters doesn’t make passwords any harder for hackers to crack, only increasing the number of characters does, according to new research from Trustwave.           

TOPICS:
The hottest topic in the insurance world today is cyber risk insurance, or coverage for the response to and fallout from cyber crime and breaches. Although high–profile breaches have led to skyrocketing interest in cyber insurance, they have also highligh

Lack of Incident Response Holding Back Cyber Insurance Market

August 14, 2014 12:21 pm | by Craig Carpenter, Property Casualty 360 | Comments

The hottest topic in the insurance world today is cyber risk insurance, or coverage for the response to and fallout from cyber crime and breaches. Although high–profile breaches have led to skyrocketing interest in cyber insurance, they have also highlighted a glaring weakness in insurance companies’ ability to price — and therefore offer — such coverage: the lack of incident resolution expertise.

TOPICS:
Even as the U.S. Air Force Academy has reduced the number of majors it offers recently, it has instituted a new program aimed at helping the Air Force fly, fight and win in cyberspace.

US Air Force Academy Introduces Computer Network Security Major

August 14, 2014 11:44 am | by U.S. Air Force | Comments

Even as the U.S. Air Force Academy has reduced the number of majors it offers recently, it has instituted a new program aimed at helping the Air Force fly, fight and win in cyberspace.                   

TOPICS:
Edward Snowden has made us painfully aware of the government’s sweeping surveillance programs over the last year. But a new program, currently being developed at the NSA, suggests that surveillance may fuel the government’s cyberdefense capabilities, too.

The NSA MonsterMind Bot Could Wage Cyber War Autonomously

August 14, 2014 10:55 am | by Kim Zetter, Wired | Comments

Edward Snowden has made us painfully aware of the government’s sweeping surveillance programs over the last year. But a new program, currently being developed at the NSA, suggests that surveillance may fuel the government’s cyberdefense capabilities, too.

TOPICS:
Virtual environments are a tool that security researchers and security software use to automatically analyze and detect malware. But according to Symantec research, virtual machines (VMs) are becoming more common in enterprise operational environments—so

Malware No Longer Avoids Virtual Machines

August 14, 2014 10:00 am | by Tara Seals, Infosecurity Magazine | Comments

Virtual environments are a tool that security researchers and security software use to automatically analyze and detect malware. But according to Symantec research, virtual machines (VMs) are becoming more common in enterprise operational environments — so malware authors are learning to write their code to attack that infrastructure more effectively while avoiding detection.

TOPICS:
Advertisement
A spate of high-profile security breaches and attacks means that security practitioners find themselves thinking a lot about incident response. A new SANS incident response survey looks at how practitioners are dealing with these numerous incidents.

How Incident Response Fights Back

August 13, 2014 10:14 am | by SANS | Comments

A spate of high-profile security breaches and attacks means that security practitioners find themselves thinking a lot about incident response. A new SANS incident response survey looks at how practitioners are dealing with these numerous incidents.

TOPICS:
Lean operations and a lack of technical staff make non-governmental organizations a prime, and relatively soft, target for well-funded adversaries, according to an academic study of a four-year campaign targeting one such group.

Activists are Easy Targets for Nation-state Attackers

August 13, 2014 9:38 am | by Robert Lemos, Ars Technica | Comments

Lean operations and a lack of technical staff make non-governmental organizations a prime, and relatively soft, target for well-funded adversaries, according to an academic study of a four-year campaign targeting one such group.      

TOPICS:

Snowden Left Clues the NSA Couldn't Find

August 13, 2014 9:27 am | by Andy Greenberg, Wired | Comments

If the NSA still doesn’t know the full extent of the greatest leak of secrets in its history, it’s not because of Edward Snowden’s attempts to cover his tracks. On the contrary, the NSA’s most prolific whistleblower now claims he purposefully left a trail of digital bread crumbs designed to lead the agency directly to the files he’d copied.

TOPICS:
Hackers can be tough opponents because the best of them share ideas online about new ways to attack networks and how to hide from law enforcement. Gangs in nations like Russia or China can be particularly resourceful and dangerous — especially since gover

Battling Hackers Like Organized Crime

August 12, 2014 11:39 am | by Tom Risen. U.S. News & World Report | Comments

Hackers can be tough opponents because the best of them share ideas online about new ways to attack networks and how to hide from law enforcement. Gangs in nations like Russia or China can be particularly resourceful and dangerous — especially since governments there are secretly sponsoring hackers' efforts and protecting them from international law enforcement.

TOPICS:

Espionage Programs Linked to Spying on Former Soviet Targets

August 12, 2014 11:08 am | by Robert Lemos, Ars Technica | Comments

A one-two combination of malware programs has infiltrated the embassies and government systems of a number of former Eastern Bloc nations as well as European targets, according to a technical analysis by security researchers.       

TOPICS:
Computer forensic and cybersecurity tools are getting smarter and easier to use by the week, but I'd like to offer a contrarian view and tell you that it's not necessarily a good thing. Better tools — or rather, better tool marketing—can lull you into a f

The Myth of the 'Find All Evidence' Button

August 12, 2014 10:12 am | by John I., LinkedIn | Comments

Computer forensic and cybersecurity tools are getting smarter and easier to use by the week, but I'd like to offer a contrarian view and tell you that it's not necessarily a good thing. Better tools — or rather, better tool marketing — can lull you into a false sense of security.

TOPICS:
Researchers have discovered click fraud malware designed to “hide in plain sight” and evade traditional security tools by embedding data into an image file.

Click Fraud Malware Found Lurking Inside Image Files

August 12, 2014 8:12 am | by Phil Muncaster, Infosecurity Magazine | Comments

Researchers have discovered click fraud malware designed to “hide in plain sight” and evade traditional security tools by embedding data into an image file.                           

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading