Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

In this blog post we'll be looking at a new type of malware for Android phones that encrypts important files and demands the user pay a ransom to regain access to their phone.

Android Images Can Conceal Code

October 22, 2014 11:12 am | Comments

Someone's found (yet) another nasty security flaw in Android, by crafting a way to pack malicious software to look like images. The good news is that disclosure was kept back until Google had put a fix in place; the bad news is, of course, the huge number of phone-owners who never update – either through choice, ignorance or that their handset-maker holds back upgrades.

TOPICS:

Justice Department Expands Fight Against Cybercrime

October 22, 2014 11:08 am | Comments

The Justice Department is expanding its National Security division to take on threats to the country from state-sponsored economic espionage and cybercrime, assistant attorney general for national security John Carlin said Tuesday.

TOPICS:

Canada to Deport Alleged Anonymous Hacker

October 22, 2014 10:40 am | Comments

Matt DeHart, an American who believes the United States is pursuing sham child-porn charges against him as cover for a national security investigation, has been ordered deported from Canada. The 30-year-old faces up to 25 years in prison if convicted of child pornography charges in Tennessee.

TOPICS:
Advertisement

Cost of Cybercrime on the Rise

October 21, 2014 6:57 am | Comments

According to the 2014 Cost of Cyber Crime Study, the average annualized cost of cybercrime has reached $12.7 million in the U.S., a 96 percent increase since the study was launched five years ago.                    

TOPICS:
While Android phones are constantly targeted by cyber criminals, the iPhone is considered more secure. Now, leaked documents from one of the world's leading surveillance companies have reaffirmed the idea.

Chinese Government Hacking iPhones?!?

October 21, 2014 6:54 am | Comments

Chinese authorities just launched “a malicious attack on Apple” that could capture user names and passwords of anyone who logs into the iCloud from anywhere in the country, the well-respected censorship watchdog GreatFire.org reports. With that information, a hacker can view users contacts, photos, messages and personal information stored in the cloud.  

TOPICS:
A two-stage financial attack has been discovered that targets multiple ATMs around the world, including Latin America, Europe and Asia, allowing attackers to remove money via direct manipulation and steal millions of dollars.

500 Million Financial Records Hacked over 12 Months

October 21, 2014 6:39 am | Comments

Federal officials warned companies Monday that hackers have stolen more than 500 million financial records over the past 12 months, essentially breaking into banks without ever entering a building.                                                                    

TOPICS:

NetClean Helps UK Home Office Fight Child Abuse

October 21, 2014 6:21 am | Comments

NetClean has announced that it has successfully collaborated with its partners, Hubstream and L-3 ASA, to implement the first phase of the UK’s national Child Abuse Image Database (CAID). The CAID plays a key part in delivering on the UK government’s promise to create a central repository for consolidating data in cases of child sexual abuse material.

TOPICS:

High Schools Add Cyber Security Curriculum

October 20, 2014 11:34 am | Comments

Staying abreast of global trends in the digital world, educators in Richmond and Co­lumbia counties are working to create new coursework that will train high school students to protect computer networks from security threats.              

TOPICS:
Advertisement

Model Helps Set Up Police Sting to Catch Hacker

October 20, 2014 11:23 am | Comments

A hacker obtained nude photographs of a California model through Apple's iCloud and gave her two choices: pay up or have your private photos distributed to the world. The hacker reportedly bragged about hacking into celebrity accounts and leaking nude photos before demanding $900 from the model or else he'd 'ruin her modeling career.' 

TOPICS:
Even as the U.S. Air Force Academy has reduced the number of majors it offers recently, it has instituted a new program aimed at helping the Air Force fly, fight and win in cyberspace.

GIAC Network Forensic Analyst Certification

October 20, 2014 11:13 am | Comments

A new forensics certification, the GIAC Network Forensic Analyst, validates that professionals who hold this credential are qualified to perform examinations employing network forensic artifact analysis and demonstrate an understanding of network forensics, normal and abnormal conditions for common network protocols, the process and tools used to examine device and system logs, wireless communication, and encryption protocols.

TOPICS:

Old Phone Fraud Finds New Life in VOIP

October 20, 2014 11:06 am | Comments

Bob Foreman’s architecture firm was the victim of an age-old fraud that has found new life now that most corporate phone lines run over the Internet. Hackers had broken into the phone network of the company, Foreman Seeley Fountain Architecture, and routed $166,000 worth of calls from the firm to premium-rate telephone numbers in Gambia, Somalia and the Maldives.

TOPICS:
Security researchers have warned of a serious security flaw in Android which could potentially leave every device open to attack.

Binder Could Blow Apart Android Security

October 17, 2014 10:03 am | by Phil Muncaster, Infosecurity Magazine | Comments

Security researchers have warned of a serious security flaw in Android which could potentially leave every device open to attack.                                 

TOPICS:
US-CERT released an advisory warning users about email scams and cyber campaigns using the Ebola virus disease as a theme.

Beware Ebola-themed Phishing, Malware and Hoaxes

October 17, 2014 9:53 am | by Zeljka Zorz, Help Net Security | Comments

US-CERT released an advisory warning users about email scams and cyber campaigns using the Ebola virus disease as a theme.                                     

TOPICS:
A surge in malware disguised as online advertisements aimed at unsuspecting web users has hit major U.S. military contractors in the past few weeks, marking a dangerous twist on a decade-old scourge for advertisers, security researchers say.

Malvertising Targets US Military Firms

October 17, 2014 9:42 am | by Eric Auchard, Reuters | Comments

A surge in malware disguised as online advertisements aimed at unsuspecting web users has hit major U.S. military contractors in the past few weeks, marking a dangerous twist on a decade-old scourge for advertisers, security researchers say.   

TOPICS:

FBI Director Warns Cellphone Encryption Will Harm Investigation

October 17, 2014 9:12 am | by Eric Tucker and Jack Gillum, Associated Press | Comments

FBI Director James Comey has warned in stark terms against the push by technology companies to encrypt smartphone data and operating systems, arguing that murder cases could be stalled, suspects could walk free and justice could be thwarted by a locked phone or an encrypted hard drive.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading