Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Researchers at Missouri University of Science and Technology are working to combat threats to cybersecurity by training the next generation of experts in the field. With a $3 million grant from the National Science Foundation, Missouri S&T’s computer scie

Missouri S&T Receives $3M from NSF to Train Cybersecurity Experts

September 19, 2014 8:24 am | by Peter Ehrhard, Missouri S&T | Comments

Researchers at Missouri University of Science and Technology are working to combat threats to cybersecurity by training the next generation of experts in the field. With a $3 million grant from the National Science Foundation, Missouri S&T’s computer science department will fund approximately 16 “Scholarship for Service” master of science and Ph.D. students, who will specialize in cybersecurity.

TOPICS:
The Citadel trojan, a popular program used by cyber criminals to gather banking credentials and steal money from accounts, has become the latest financial malware to be repurposed as a tool to steal industrial secrets — this time from petrochemical compan

Citadel Financial Trojan Turns Corporate Spy

September 18, 2014 10:54 am | by Robert Lemos, Ars Technica | Comments

The Citadel trojan, a popular program used by cyber criminals to gather banking credentials and steal money from accounts, has become the latest financial malware to be repurposed as a tool to steal industrial secrets — this time from petrochemical companies in the Middle East.

TOPICS:

Forty-Three Accused of Running Cybersex Ring in Philippines

September 18, 2014 10:42 am | by Associated Press | Comments

Philippine authorities arrested 43 suspected members of a syndicate that runs a lucrative online cybersex operation catering to clients worldwide, officials said Thursday.                       

TOPICS:
Advertisement
Ten years ago the US Navy invented Tor, an anonymous web browser. Now the ‘dark net’ is used to trade guns, drugs and child pornography, do its creators have any regrets?

The Great Dark Net Debate

September 18, 2014 10:37 am | by Jake Wallis Simons, The Telegraph | Comments

Ten years ago the US Navy invented Tor, an anonymous web browser. Now the ‘dark net’ is used to trade guns, drugs and child pornography, do its creators have any regrets?                       

TOPICS:
In the digital drug trade as in the physical one, taking out one kingpin only makes room for another ready to satisfy the market’s endless demand. In the case of the FBI’s takedown of the Silk Road, the latest of the up-and-coming drug kingpins is far mor

Rise of the 'Evolution' Drug Market

September 18, 2014 10:01 am | by Andy Greenberg, Wired | Comments

In the digital drug trade as in the physical one, taking out one kingpin only makes room for another ready to satisfy the market’s endless demand. In the case of the FBI’s takedown of the Silk Road, the latest of the up-and-coming drug kingpins is far more evolved than its predecessor — and far less principled.

TOPICS:
China's military hacked into computer networks of civilian transportation companies hired by the Pentagon at least nine times, breaking into computers aboard a commercial ship, targeting logistics companies and uploading malicious software onto an airline

China Hacked Military Contractor Networks Says Senate

September 17, 2014 4:15 pm | by Jack Gillum, Associated Press | Comments

China's military hacked into computer networks of civilian transportation companies hired by the Pentagon at least nine times, breaking into computers aboard a commercial ship, targeting logistics companies and uploading malicious software onto an airline's computers, Senate investigators say.

TOPICS:
A hoax known as "swatting" initially targeting celebrities has now become a way for players of combat-themed video games to retaliate against opponents while thousands of spectators watch. The perpetrators can watch their hijinks unfold minute by minute i

Gamers Use Police Hoax to Lash Out at Opponents

September 17, 2014 12:10 pm | by Sadie Gurman, Associated Press | Comments

A hoax known as "swatting" initially targeting celebrities has now become a way for players of combat-themed video games to retaliate against opponents while thousands of spectators watch. The perpetrators can watch their hijinks unfold minute by minute in a window that shows a live video image of other players.

TOPICS:
As U.S. military leaders outlined their strategy before Congress to fight Islamic State militants on the battlefield, the National Security Agency chief said he was watching the media-savvy group's cyber capabilities.

NSA Monitoring Tech-savvy Islamic State

September 17, 2014 11:41 am | by Donna Chiacu, Reuters | Comments

As U.S. military leaders outlined their strategy before Congress to fight Islamic State militants on the battlefield, the National Security Agency chief said on Tuesday he was watching the media-savvy group's cyber capabilities.      

TOPICS:
Advertisement
A federal appeals court said the US Navy's scanning of the public's computers for images of child pornography constituted "a profound lack of regard for the important limitations on the role of the military in our civilian society."

Court Reprimands US Navy for Scanning Civilian Computers for Child Porn

September 17, 2014 11:28 am | by David Kravets, Ars Technica | Comments

A federal appeals court said the US Navy's scanning of the public's computers for images of child pornography constituted "a profound lack of regard for the important limitations on the role of the military in our civilian society."     

TOPICS:
Security of IT networks is continually being improved to protect against   malicious hackers. Yet when IT networks interface with infrastructures such   as water and electric systems to provide monitoring and control capabilities,   they often introduce n

Protecting Infrastructure with Smarter Cyber-Physical Systems

September 16, 2014 11:23 am | by Eric Brown, MIT | Comments

Security of IT networks is continually being improved to protect against malicious hackers. Yet when IT networks interface with infrastructures such as water and electric systems to provide monitoring and control capabilities, they often introduce new vulnerabilities that increase the risks of service disruptions.

TOPICS:
The Nigerian authorities are looking for a missing IT admin at an unnamed bank who is suspected of helping cybercriminals make off with 6.28 billion Naira ($38.6m).

Nigerian Bank IT Worker Missing after Multi-billion Naira Heist

September 16, 2014 10:43 am | by Phil Muncaster, Infosecurity Magazine | Comments

The Nigerian authorities are looking for a missing IT admin at an unnamed bank who is suspected of helping cybercriminals make off with 6.28 billion Naira ($38.6m).                         

TOPICS:
A small cybersecurity firm claimed this summer to have uncovered a scam by Russian Internet thieves to amass a mountain of stolen information from420,000 Web and FTP sites. Although a New York Times story lent credibility to the claims, some observers que

Crime Ring Revelation Exposes Cybersecurity Conflict of Interest

September 16, 2014 8:26 am | by Erik Schechter, Scientific American | Comments

A small cybersecurity firm claimed this summer to have uncovered a scam by Russian Internet thieves to amass a mountain of stolen information from 420,000 Web and FTP sites. Although a New York Times story lent credibility to the claims, some observers question whether the cybersecurity vendor’s big reveal was more of a publicity stunt than a public service. 

TOPICS:

Even Biometric Locks Can be Picked

September 16, 2014 8:26 am | by Andrew Smith, The Conversation | Comments

How can we ensure that someone is who they say they are? How can be sure that the person in our system, both digitally speaking or physically in front of us, is who whom they claim to be? You may think that a good password is the answer, but with so many ways to break into a computer system these methods are clearly not always effective.

TOPICS:
There are many ways bad guys attack systems, disrupt infrastructures and steal data, but one of the most common uses an entry point that is vital to Internet communications and yet, it seems, carelessly disregarded: the humble, but crucial, SSL.

SSL Remains Security Weakness Despite Latest Reinforcements

September 15, 2014 11:01 am | by Brian Robinson | Comments

There are many ways bad guys attack systems, disrupt infrastructures and steal data, but one of the most common uses an entry point that is vital to Internet communications and yet, it seems, carelessly disregarded: the humble, but crucial, SSL.

TOPICS:
Matt Weeks, one of the developers who contributes code to the open source Metasploit Project, has published a long report detailing how he was able to reverse-engineer the encrypted communications protocol used by Ammyy Admin, one of the most popular remo

Turning the Tables on Tech Support Scammers

September 15, 2014 10:43 am | by Lee Hutchinson, Ars Technica | Comments

Matt Weeks, one of the developers who contributes code to the open source Metasploit Project, has published a long report detailing how he was able to reverse-engineer the encrypted communications protocol used by Ammyy Admin, one of the most popular remote control apps used by tech support scammers, and then use that knowledge to ferret out a vulnerability in the Ammyy Admin application.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading