Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

New York's financial regulator says his agency will focus on cybersecurity over the next year, saying the possibility of a systemic attack to the financial system is one thing that keeps him awake at night.

NY Financial Regulator to Focus on Cybersecurity

September 23, 2014 10:52 am | by Luciana Lopez and Karen Freifeld, Reuters | Comments

New York's financial regulator says his agency will focus on cybersecurity over the next year, saying the possibility of a systemic attack to the financial system is one thing that keeps him awake at night.             

TOPICS:
In a big step for securing critical information systems, such as medical records in clinical settings, Dartmouth College researchers have created a new approach to computer security that authenticates users continuously while they are using a terminal and

ZEBRA Bracelet Strengthens Computer Security

September 23, 2014 10:40 am | by Dartmouth College | Comments

In a big step for securing critical information systems, such as medical records in clinical settings, researchers have created a new approach to computer security that authenticates users continuously while they are using a terminal and automatically logs them out when they leave or when someone else steps in to use their terminal.

TOPICS:
Financial cybercrime Trojans, originally used to steal credentials from online banking users, are increasingly being used for espionage purposes.

Financial Trojans Used for Espionage

September 23, 2014 10:24 am | by Mathew Schwartz, Gov Info Security | Comments

Financial cybercrime Trojans, originally used to steal credentials from online banking users, are increasingly being used for espionage purposes.                             

TOPICS:
Advertisement
After a security incident is detected tremendous resources are spent in the forensic investigation trying to figure out what exactly happened and what data, if any, was compromised. If the forensic investigation doesn’t yield definitive results fairly qui

Avoid Wasting Time During a Breach Investigation

September 23, 2014 10:08 am | by Rekha Shenoy, Tripwire | Comments

After a security incident is detected tremendous resources are spent in the forensic investigation trying to figure out what exactly happened and what data, if any, was compromised. If the forensic investigation doesn’t yield definitive results fairly quickly the organization is left with no choice but to assume the worst.

TOPICS:
 The risks were clear to computer experts inside Home Depot: The home improvement chain, they warned for years, might be easy prey for hackers.

Former Cybersecurity Staff Say Home Depot Left Data Vulnerable

September 22, 2014 10:46 am | by Julie Creswell and Nicole Perlroth, The New York Times | Comments

The risks were clear to computer experts inside Home Depot: The home improvement chain, they warned for years, might be easy prey for hackers.                               

TOPICS:
In many cases, the American judicial system doesn’t view an encrypted phone as an insurmountable privacy protection for those accused of a crime. Instead, it’s seen as an obstruction of the evidence-gathering process, and a stubborn defendant or witness c

Courts See an Encrypted Phone as Evidence Obstruction

September 22, 2014 10:27 am | by Andy Greenberg, Wired | Comments

In many cases, the American judicial system doesn’t view an encrypted phone as an insurmountable privacy protection for those accused of a crime. Instead, it’s seen as an obstruction of the evidence-gathering process, and a stubborn defendant or witness can be held in contempt of court and jailed for failing to unlock a phone to provide that evidence.

TOPICS:
Australia's peak intelligence agency is stepping up its analysis of terrorist threats, including scouring social media to track extremist propaganda and recruitment efforts.

Australian Spies Track Terror Threats on Social Media

September 22, 2014 10:12 am | by Philip Dorling, The Sydney Morning Herald | Comments

Australia's peak intelligence agency is stepping up its analysis of terrorist threats, including scouring social media to track extremist propaganda and recruitment efforts.                      

TOPICS:
The next generation of Google’s Android operating system, due for release next month, will encrypt data by default for the first time, the company said Thursday, raising yet another barrier to police gaining access to the troves of personal data typically

New Androids to Offer Default Encryption, Blocking Police

September 19, 2014 10:59 am | by Craig Timberg, The Washington Post | Comments

The next generation of Google’s Android operating system, due for release next month, will encrypt data by default for the first time, the company said Thursday, raising yet another barrier to police gaining access to the troves of personal data typically kept on smartphones.

TOPICS:
Advertisement
A reminder to iPhone owners cheering Apple’s latest privacy win: Just because Apple will no longer help police to turn your smartphone inside out doesn’t mean it can prevent police from vivisecting the device on their own.

You Can Still Pull Data Off a Locked iPhone

September 19, 2014 10:46 am | by Andy Greenberg, Wired | Comments

A reminder to iPhone owners cheering Apple’s latest privacy win: Just because Apple will no longer help police to turn your smartphone inside out doesn’t mean it can prevent police from vivisecting the device on their own.

TOPICS:
Researchers at Missouri University of Science and Technology are working to combat threats to cybersecurity by training the next generation of experts in the field. With a $3 million grant from the National Science Foundation, Missouri S&T’s computer scie

Missouri S&T Receives $3M from NSF to Train Cybersecurity Experts

September 19, 2014 8:24 am | by Peter Ehrhard, Missouri S&T | Comments

Researchers at Missouri University of Science and Technology are working to combat threats to cybersecurity by training the next generation of experts in the field. With a $3 million grant from the National Science Foundation, Missouri S&T’s computer science department will fund approximately 16 “Scholarship for Service” master of science and Ph.D. students, who will specialize in cybersecurity.

TOPICS:
The Citadel trojan, a popular program used by cyber criminals to gather banking credentials and steal money from accounts, has become the latest financial malware to be repurposed as a tool to steal industrial secrets — this time from petrochemical compan

Citadel Financial Trojan Turns Corporate Spy

September 18, 2014 10:54 am | by Robert Lemos, Ars Technica | Comments

The Citadel trojan, a popular program used by cyber criminals to gather banking credentials and steal money from accounts, has become the latest financial malware to be repurposed as a tool to steal industrial secrets — this time from petrochemical companies in the Middle East.

TOPICS:

Forty-Three Accused of Running Cybersex Ring in Philippines

September 18, 2014 10:42 am | by Associated Press | Comments

Philippine authorities arrested 43 suspected members of a syndicate that runs a lucrative online cybersex operation catering to clients worldwide, officials said Thursday.                       

TOPICS:
Ten years ago the US Navy invented Tor, an anonymous web browser. Now the ‘dark net’ is used to trade guns, drugs and child pornography, do its creators have any regrets?

The Great Dark Net Debate

September 18, 2014 10:37 am | by Jake Wallis Simons, The Telegraph | Comments

Ten years ago the US Navy invented Tor, an anonymous web browser. Now the ‘dark net’ is used to trade guns, drugs and child pornography, do its creators have any regrets?                       

TOPICS:
In the digital drug trade as in the physical one, taking out one kingpin only makes room for another ready to satisfy the market’s endless demand. In the case of the FBI’s takedown of the Silk Road, the latest of the up-and-coming drug kingpins is far mor

Rise of the 'Evolution' Drug Market

September 18, 2014 10:01 am | by Andy Greenberg, Wired | Comments

In the digital drug trade as in the physical one, taking out one kingpin only makes room for another ready to satisfy the market’s endless demand. In the case of the FBI’s takedown of the Silk Road, the latest of the up-and-coming drug kingpins is far more evolved than its predecessor — and far less principled.

TOPICS:
China's military hacked into computer networks of civilian transportation companies hired by the Pentagon at least nine times, breaking into computers aboard a commercial ship, targeting logistics companies and uploading malicious software onto an airline

China Hacked Military Contractor Networks Says Senate

September 17, 2014 4:15 pm | by Jack Gillum, Associated Press | Comments

China's military hacked into computer networks of civilian transportation companies hired by the Pentagon at least nine times, breaking into computers aboard a commercial ship, targeting logistics companies and uploading malicious software onto an airline's computers, Senate investigators say.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading