Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

The fixes Apple bolted on to iCloud’s security following its epic spill of stolen celebrity nudes may be far from perfect. But give Apple credit: It made a lot of sex-starved hackers very unhappy.

Apple Ruined the Nude Photo Party

September 24, 2014 10:13 am | by Andy Greenberg, Wired | Comments

The fixes Apple bolted on to iCloud’s security following its epic spill of stolen celebrity nudes may be far from perfect. But give Apple credit: It made a lot of sex-starved hackers very unhappy.               

TOPICS:
A continuing trend of DDoS attacks are short in duration and repeated frequently. In parallel, high-volume and high-rate DDoS attacks were on the upswing in the first half of 2014, according to NSFOCUS.

High-volume DDoS Attacks on the Rise

September 23, 2014 11:31 am | by Help Net Security | Comments

A continuing trend of  are short in duration and repeated frequently. In parallel, high-volume and high-rate DDoS attacks were on the upswing in the first half of 2014, according to NSFOCUS.               

TOPICS:
When Home Depot suffered a breach of transaction data that exposed as many as 52 million credit card transactions earlier this year, the company reportedly suffered from lax computer and network security measures for years. Apparently, the company wasn’t

Home Depot's Former Security Architect Had History of Techno-sabotage

September 23, 2014 11:12 am | by Sean Gallagher, Ars Technica | Comments

When Home Depot suffered a breach of transaction data that exposed as many as 52 million credit card transactions earlier this year, the company reportedly suffered from lax computer and network security measures for years. Apparently, the company wasn’t helped much by its selection of a security architect either.

TOPICS:
Advertisement
New York's financial regulator says his agency will focus on cybersecurity over the next year, saying the possibility of a systemic attack to the financial system is one thing that keeps him awake at night.

NY Financial Regulator to Focus on Cybersecurity

September 23, 2014 10:52 am | by Luciana Lopez and Karen Freifeld, Reuters | Comments

New York's financial regulator says his agency will focus on cybersecurity over the next year, saying the possibility of a systemic attack to the financial system is one thing that keeps him awake at night.             

TOPICS:
In a big step for securing critical information systems, such as medical records in clinical settings, Dartmouth College researchers have created a new approach to computer security that authenticates users continuously while they are using a terminal and

ZEBRA Bracelet Strengthens Computer Security

September 23, 2014 10:40 am | by Dartmouth College | Comments

In a big step for securing critical information systems, such as medical records in clinical settings, researchers have created a new approach to computer security that authenticates users continuously while they are using a terminal and automatically logs them out when they leave or when someone else steps in to use their terminal.

TOPICS:
Financial cybercrime Trojans, originally used to steal credentials from online banking users, are increasingly being used for espionage purposes.

Financial Trojans Used for Espionage

September 23, 2014 10:24 am | by Mathew Schwartz, Gov Info Security | Comments

Financial cybercrime Trojans, originally used to steal credentials from online banking users, are increasingly being used for espionage purposes.                             

TOPICS:
After a security incident is detected tremendous resources are spent in the forensic investigation trying to figure out what exactly happened and what data, if any, was compromised. If the forensic investigation doesn’t yield definitive results fairly qui

Avoid Wasting Time During a Breach Investigation

September 23, 2014 10:08 am | by Rekha Shenoy, Tripwire | Comments

After a security incident is detected tremendous resources are spent in the forensic investigation trying to figure out what exactly happened and what data, if any, was compromised. If the forensic investigation doesn’t yield definitive results fairly quickly the organization is left with no choice but to assume the worst.

TOPICS:
 The risks were clear to computer experts inside Home Depot: The home improvement chain, they warned for years, might be easy prey for hackers.

Former Cybersecurity Staff Say Home Depot Left Data Vulnerable

September 22, 2014 10:46 am | by Julie Creswell and Nicole Perlroth, The New York Times | Comments

The risks were clear to computer experts inside Home Depot: The home improvement chain, they warned for years, might be easy prey for hackers.                               

TOPICS:
Advertisement
In many cases, the American judicial system doesn’t view an encrypted phone as an insurmountable privacy protection for those accused of a crime. Instead, it’s seen as an obstruction of the evidence-gathering process, and a stubborn defendant or witness c

Courts See an Encrypted Phone as Evidence Obstruction

September 22, 2014 10:27 am | by Andy Greenberg, Wired | Comments

In many cases, the American judicial system doesn’t view an encrypted phone as an insurmountable privacy protection for those accused of a crime. Instead, it’s seen as an obstruction of the evidence-gathering process, and a stubborn defendant or witness can be held in contempt of court and jailed for failing to unlock a phone to provide that evidence.

TOPICS:
Australia's peak intelligence agency is stepping up its analysis of terrorist threats, including scouring social media to track extremist propaganda and recruitment efforts.

Australian Spies Track Terror Threats on Social Media

September 22, 2014 10:12 am | by Philip Dorling, The Sydney Morning Herald | Comments

Australia's peak intelligence agency is stepping up its analysis of terrorist threats, including scouring social media to track extremist propaganda and recruitment efforts.                      

TOPICS:
The next generation of Google’s Android operating system, due for release next month, will encrypt data by default for the first time, the company said Thursday, raising yet another barrier to police gaining access to the troves of personal data typically

New Androids to Offer Default Encryption, Blocking Police

September 19, 2014 10:59 am | by Craig Timberg, The Washington Post | Comments

The next generation of Google’s Android operating system, due for release next month, will encrypt data by default for the first time, the company said Thursday, raising yet another barrier to police gaining access to the troves of personal data typically kept on smartphones.

TOPICS:
A reminder to iPhone owners cheering Apple’s latest privacy win: Just because Apple will no longer help police to turn your smartphone inside out doesn’t mean it can prevent police from vivisecting the device on their own.

You Can Still Pull Data Off a Locked iPhone

September 19, 2014 10:46 am | by Andy Greenberg, Wired | Comments

A reminder to iPhone owners cheering Apple’s latest privacy win: Just because Apple will no longer help police to turn your smartphone inside out doesn’t mean it can prevent police from vivisecting the device on their own.

TOPICS:
Researchers at Missouri University of Science and Technology are working to combat threats to cybersecurity by training the next generation of experts in the field. With a $3 million grant from the National Science Foundation, Missouri S&T’s computer scie

Missouri S&T Receives $3M from NSF to Train Cybersecurity Experts

September 19, 2014 8:24 am | by Peter Ehrhard, Missouri S&T | Comments

Researchers at Missouri University of Science and Technology are working to combat threats to cybersecurity by training the next generation of experts in the field. With a $3 million grant from the National Science Foundation, Missouri S&T’s computer science department will fund approximately 16 “Scholarship for Service” master of science and Ph.D. students, who will specialize in cybersecurity.

TOPICS:
The Citadel trojan, a popular program used by cyber criminals to gather banking credentials and steal money from accounts, has become the latest financial malware to be repurposed as a tool to steal industrial secrets — this time from petrochemical compan

Citadel Financial Trojan Turns Corporate Spy

September 18, 2014 10:54 am | by Robert Lemos, Ars Technica | Comments

The Citadel trojan, a popular program used by cyber criminals to gather banking credentials and steal money from accounts, has become the latest financial malware to be repurposed as a tool to steal industrial secrets — this time from petrochemical companies in the Middle East.

TOPICS:

Forty-Three Accused of Running Cybersex Ring in Philippines

September 18, 2014 10:42 am | by Associated Press | Comments

Philippine authorities arrested 43 suspected members of a syndicate that runs a lucrative online cybersex operation catering to clients worldwide, officials said Thursday.                       

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading