Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

As hacking attacks reach epidemic proportions, the US cybersecurity community is looking at new ways to step up defense, including counterattacking the hackers themselves.

US Not Hacking Back Yet against Cyber Attacks

November 6, 2014 12:24 pm | by Rob Lever, AFP | Comments

As hacking attacks reach epidemic proportions, the US cybersecurity community is looking at new ways to step up defense, including counterattacking the hackers themselves.                       

TOPICS:
Routine, unsanctioned file sharing among employees has put organizations at risk equal to or greater than the dangers posed by direct data theft, according to research.

Whose file sharing tools are leaking data?

November 6, 2014 12:11 pm | by GCN | Comments

Routine, unsanctioned file sharing among employees has put organizations at risk equal to or greater than the dangers posed by direct data theft, according to research.                       

TOPICS:
For most of the iPhone's lifespan, it's been effectively immune to malware. There were theoretical attacks and viruses targeting jailbroken phones, but thanks to the tight controls of the App Store, finding iOS malware in the wild has been nearly impossib

The iPhone Just Lost Its Perfect Security Record

November 6, 2014 11:56 am | by Russell Brandom, The Verge | Comments

For most of the iPhone's lifespan, it's been effectively immune to malware. There were theoretical attacks and viruses targeting jailbroken phones, but thanks to the tight controls of the App Store, finding iOS malware in the wild has been nearly impossible. Yesterday, that changed. 

TOPICS:
Advertisement
 Researchers have discovered new capabilities in the BlackEnergy crimeware tool that significantly extend its reach. The ability to run on network devices, steal digital certificates, and render infected computers unbootable are just a few of new-found we

Crimeware Gets Powerful New Functions

November 5, 2014 10:06 am | by Dan Goodin, Ars Technica | Comments

Researchers have discovered new capabilities in the BlackEnergy crimeware tool that significantly extend its reach. The ability to run on network devices, steal digital certificates, and render infected computers unbootable are just a few of new-found weapons in its arsenal.

TOPICS:
Targeted attacks could soar next year as increasing numbers of cyber-criminals in different geographies get their hands on the tools and techniques necessary to do the job, according to Trend Micro.

Targeted Attacks Could Go Mainstream Next Year

November 5, 2014 9:54 am | by Phil Muncaster, Infosecurity Magazine | Comments

Targeted attacks could soar next year as increasing numbers of cyber-criminals in different geographies get their hands on the tools and techniques necessary to do the job, according to Trend Micro.               

TOPICS:
One of the founders of popular file-sharing website The Pirate Bay has been arrested under an Interpol warrant as he was crossing into Thailand from Laos, police said Tuesday.

Pirate Bay Co-founder Arrested at Thai-Lao Border

November 5, 2014 9:43 am | by Thanyarat Diksone, Associated Press | Comments

One of the founders of popular file-sharing website The Pirate Bay has been arrested under an Interpol warrant as he was crossing into Thailand from Laos, police said Tuesday.                     

TOPICS:
Many companies offer "secure messaging" products — but how can users know if these systems actually secure? The Electronic Frontier Foundation has released its Secure Messaging Scorecard, evaluating dozens of messaging technologies on a range of security

Which Messaging Technologies are Truly Safe and Secure?

November 5, 2014 9:34 am | by EFF | Comments

Many companies offer "secure messaging" products — but how can users know if these systems actually secure? The Electronic Frontier Foundation has released its Secure Messaging Scorecard, evaluating dozens of messaging technologies on a range of security best practices.

TOPICS:
A flaw in Visa’s contactless credit cards means they will approve unlimited   cash transactions without a PIN when the amount is requested in a foreign   currency.

Fake POS Steals Foreign Currency through Visa Contactless Payments

November 4, 2014 11:26 am | by Newcastle University | Comments

A flaw in Visa’s contactless credit cards means they will approve unlimited cash transactions without a PIN when the amount is requested in a foreign currency.                         

TOPICS:
Advertisement
As the pro-democracy movement in Hong Kong has continued to mount a series of protests, attackers believed to be China-backed have launched a series of distributed denial of service attacks (DDoS) against websites promoting the movement there.

Chinese APT Actors Linked to DDoS against Hong Kong's Protesters

November 4, 2014 11:09 am | by Tara Seals, Infosecurity Magazine | Comments

As the pro-democracy movement in Hong Kong has continued to mount a series of protests, attackers believed to be China-backed have launched a series of distributed denial of service attacks (DDoS) against websites promoting the movement there. 

TOPICS:
Wired and Forbes reported recently that the two largest cellphone carriers in the United States, Verizon and AT&T, are adding the tracking number to their subscribers' Internet activity, even when users opt out.

Somebody's Already Using Verizon's ID to Track Users

November 4, 2014 10:43 am | by Julia Angwin and Jeff Larson, ProPublica | Comments

Wired and Forbes reported recently that the two largest cellphone carriers in the United States, Verizon and AT&T, are adding the tracking number to their subscribers' Internet activity, even when users opt out.     

TOPICS:
Twitter and Facebook are so important to militant groups that the U.S. technology giants should give security services greater access to allow Western governments to foil attacks, the head of Britain's eavesdropping agency said.

UK Spy Chief Says Terrorists Grow Networks with Social Media

November 4, 2014 10:22 am | by Guy Faulconbridge, Reuters | Comments

Twitter and Facebook are so important to militant groups that the U.S. technology giants should give security services greater access to allow Western governments to foil attacks, the head of Britain's eavesdropping agency said.      

TOPICS:
Facebook has never had much of a reputation for letting users hide their   identities online. But now the world’s least anonymous website has just   joined the Web’s most anonymous network.

Facebook Tor Users Anonymous to Everyone but Facebook

November 3, 2014 11:15 am | by Andy Greenberg, Wired | Comments

Facebook has never had much of a reputation for letting users hide their identities online. But now the world’s least anonymous website has just joined the Web’s most anonymous network.                   

TOPICS:
When an agency identifies and successfully responds to a cyber attack, it gains knowledge that can be used by others facing the same or similar threats. Because attackers often use similar strategies, tools, and methods against multiple organizations, sha

NIST Drafts Cyber Threat Info Sharing Guidance

November 3, 2014 10:43 am | by GCN | Comments

When an agency identifies and successfully responds to a cyber attack, it gains knowledge that can be used by others facing the same or similar threats. Because attackers often use similar strategies, tools, and methods against multiple organizations, shared threat intelligence can reduce the impact of future attacks.

TOPICS:
The Navy is embarking on a year-long effort to protect hardware and software servicewide, as the Internet of Things takes hold of everything from ship speakers to missile launchers.

Navy Becoming Cyber Ready

November 3, 2014 10:24 am | by Aliya Sternstein, Nextgov | Comments

The Navy is embarking on a year-long effort to protect hardware and software servicewide, as the Internet of Things takes hold of everything from ship speakers to missile launchers.                    

TOPICS:
Most modern cryptographic schemes rely on computational complexity for their security. In principle, they can be cracked, but that would take a prohibitively long time, even with enormous computational resources. There is, however, another notion of secur

Raising the Limits of Cryptography

November 3, 2014 10:02 am | by Larry Hardesty, MIT | Comments

Most modern cryptographic schemes rely on computational complexity for their security. In principle, they can be cracked, but that would take a prohibitively long time, even with enormous computational resources. There is, however, another notion of security.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading