Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Organized Crime Opting for Hidden Internet Service Industry

September 29, 2014 9:51 am | by Europol | Comments

The 2014 iOCTA (Internet Organised Crime Threat Assessment), published by Europol's European Cybercrime Centre (EC3), describes an increased commercialization of cyber crime. A service-based criminal industry is developing, in which specialists in the virtual underground economy develop products and services for use by other criminals. 

TOPICS:
The US financial services industry is finally getting tough on cybercrime, with the announcement of a new body to be tasked with developing threat intelligence products.

US Banks Get Serious about Security Information Sharing

September 26, 2014 10:40 am | by Phil Muncaster, Infosecurity Magazine | Comments

The US financial services industry is finally getting tough on cyber crime, with the announcement of a new body to be tasked with developing threat intelligence products.                       

TOPICS:
FBI Director James B. Comey sharply criticized Apple and Google recently for developing forms of smartphone encryption so secure that law enforcement officials cannot easily gain access to information stored on the devices — even when they have valid sear

FBI Blasts Apple, Google for Blocking Phones from Police Investigation

September 26, 2014 10:13 am | by Craig Timberg and Greg Miller, The Washington Post | Comments

FBI Director James B. Comey sharply criticized Apple and Google recently for developing forms of smartphone encryption so secure that law enforcement officials cannot easily gain access to information stored on the devices — even when they have valid search warrants.

TOPICS:
Advertisement
With a bug as dangerous as the “shellshock” security vulnerability discovered recently, it takes less than 24 hours to go from proof-of-concept to pandemic.

Hackers Already Using Shellshock Bug to Launch Botnet Attacks

September 26, 2014 9:56 am | by Andy Greenberg, Wired | Comments

With a bug as dangerous as the “shellshock” security vulnerability discovered recently, it takes less than 24 hours to go from proof-of-concept to pandemic.                           

TOPICS:
A security vulnerability in the GNU Bourne Again Shell (Bash), the command-line shell used in many Linux and Unix operating systems, could leave systems running those operating systems open to exploitation by specially crafted attacks.

Bug in Bash Shell Creates Security Hole for Linux and Unix

September 25, 2014 10:19 am | by Sean Gallagher, Ars Technica | Comments

A security vulnerability in the GNU Bourne Again Shell (Bash), the command-line shell used in many Linux and Unix operating systems, could leave systems running those operating systems open to exploitation by specially crafted attacks.    

TOPICS:
In 1960, an IBM engineer named Forrest Parry was developing a new type of ID card for the CIA when he had an epiphany: Why not make each card a tiny data storage device in and of itself? He cut a short length of half-inch wide magnetic tape from a reel an

Why the Heyday of Credit Card Fraud is Almost Over

September 25, 2014 9:56 am | by Kevin Poulsen, Wired | Comments

In 1960, an IBM engineer named Forrest Parry was developing a new type of ID card for the CIA when he had an epiphany: Why not make each card a tiny data storage device in and of itself? He cut a short length of half-inch wide magnetic tape from a reel and wrapped it around a blank plastic card, secured it with Scotch tape, and then, at his wife’s suggestion, pressed it on with a warm iron. The magnetic stripe card was born.

TOPICS:
A new toolkit known as Spike is living up to its name by fomenting a series of powerful distributed denial of service (DDoS) attacks. Its specialty is helping malicious actors to build bigger DDoS botnets by targeting a wider range of Internet-capable dev

Spike DDoS Kit Driving 'Huge' Multi-Vector Attacks

September 25, 2014 9:13 am | by Tara Seals, Infosecurity Magazine | Comments

A new toolkit known as Spike is living up to its name by fomenting a series of powerful distributed denial of service (DDoS) attacks. Its specialty is helping malicious actors to build bigger DDoS botnets by targeting a wider range of Internet-capable devices. And that in turn drives…wait for it…a ‘spike’ in traffic.

TOPICS:
Your medical information is worth 10 times more than your credit card number on the black market. Security experts say cyber criminals are increasingly targeting the $3 trillion U.S. healthcare industry, which has many companies still reliant on aging com

Medical Records Worth More to Hackers Credit Cards

September 25, 2014 9:05 am | by Caroline Humer and Jim Finkle, Reuters | Comments

Your medical information is worth 10 times more than your credit card number on the black market. Security experts say cyber criminals are increasingly targeting the $3 trillion U.S. healthcare industry, which has many companies still reliant on aging computer systems that do not use the latest security features.

TOPICS:
Advertisement

NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence

September 25, 2014 8:16 am | by NIST | Comments

The U.S. Commerce Department’s National Institute of Standards and Technology has awarded a contract to operate its first Federally Funded Research and Development Center, which will support the National Cybersecurity Center of Excellence.   

TOPICS:
Dogs have been trained to pick up the scent for laptops, digital cameras and   those easy-to-conceal USB drives. Devices such as these are often used to   stash illegal materials like child pornography, which the FBI says is growing   fast.

Police Dog Can Smell a Hidden USB Drive

September 24, 2014 10:56 am | by Kristen Schweizer, Bloomberg | Comments

Dogs have been trained to pick up the scent for laptops, digital cameras and those easy-to-conceal USB drives. Devices such as these are often used to stash illegal materials like child pornography, which the FBI says is growing fast.     

TOPICS:
Viator, a tour-booking website used by TripAdvisor and others, has just notified 1.4 million customers that their data may have been compromised in a recent data breach. In all, 880,000 customers may have had their payment information compromised, while a

Massive Viator Data Breach Hits 1.4 Million Victims

September 24, 2014 10:20 am | by Tara Seals, Infosecurity Magazine | Comments

Viator, a tour-booking website used by TripAdvisor and others, has just notified 1.4 million customers that their data may have been compromised in a recent data breach. In all, 880,000 customers may have had their payment information compromised, while another 560,000 likely had their email address and encrypted Viator password leaked.

TOPICS:
The fixes Apple bolted on to iCloud’s security following its epic spill of stolen celebrity nudes may be far from perfect. But give Apple credit: It made a lot of sex-starved hackers very unhappy.

Apple Ruined the Nude Photo Party

September 24, 2014 10:13 am | by Andy Greenberg, Wired | Comments

The fixes Apple bolted on to iCloud’s security following its epic spill of stolen celebrity nudes may be far from perfect. But give Apple credit: It made a lot of sex-starved hackers very unhappy.               

TOPICS:
A continuing trend of DDoS attacks are short in duration and repeated frequently. In parallel, high-volume and high-rate DDoS attacks were on the upswing in the first half of 2014, according to NSFOCUS.

High-volume DDoS Attacks on the Rise

September 23, 2014 11:31 am | by Help Net Security | Comments

A continuing trend of  are short in duration and repeated frequently. In parallel, high-volume and high-rate DDoS attacks were on the upswing in the first half of 2014, according to NSFOCUS.               

TOPICS:
When Home Depot suffered a breach of transaction data that exposed as many as 52 million credit card transactions earlier this year, the company reportedly suffered from lax computer and network security measures for years. Apparently, the company wasn’t

Home Depot's Former Security Architect Had History of Techno-sabotage

September 23, 2014 11:12 am | by Sean Gallagher, Ars Technica | Comments

When Home Depot suffered a breach of transaction data that exposed as many as 52 million credit card transactions earlier this year, the company reportedly suffered from lax computer and network security measures for years. Apparently, the company wasn’t helped much by its selection of a security architect either.

TOPICS:
New York's financial regulator says his agency will focus on cybersecurity over the next year, saying the possibility of a systemic attack to the financial system is one thing that keeps him awake at night.

NY Financial Regulator to Focus on Cybersecurity

September 23, 2014 10:52 am | by Luciana Lopez and Karen Freifeld, Reuters | Comments

New York's financial regulator says his agency will focus on cybersecurity over the next year, saying the possibility of a systemic attack to the financial system is one thing that keeps him awake at night.             

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading