Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Nuclear Regulatory Commission computers within the past three years were successfully hacked by foreigners twice and also by an unidentifiable individual, according to an internal investigation.

Nuclear Regulator Hacked by Suspected Foreign Powers

August 19, 2014 10:37 am | by Aliya Sternstein, Nextgov | Comments

Nuclear Regulatory Commission computers within the past three years were successfully hacked by foreigners twice and also by an unidentifiable individual, according to an internal investigation.               

TOPICS:
Discussions of what government should do about the state of poor cyber defenses tend to focus on some kind of change in the law to raise regulations and/or lower liabilities. That is well and good, but government should also think about building a new org

A CDC for Cyber Crime

August 19, 2014 10:23 am | by Peter Singer, Wired | Comments

Discussions of what government should do about the state of poor cyber defenses tend to focus on some kind of change in the law to raise regulations and/or lower liabilities. That is well and good, but government should also think about building a new organization for the cyber age. And it can do so by taking inspiration from one of the most successful agencies created in the past.

TOPICS:
There are striking similarities between a crime scene investigation and cybercrime forensics. With IBM reporting 1.5 million U.S. cyber attacks monitored in 2013, IT and security professionals can take a few tips from law enforcement about securing, asses

Cyber Forensics: Taking Tips from a Detective's Playbook

August 18, 2014 3:50 pm | by Jayne Friedland Holland, GSN Magazine | Comments

There are striking similarities between a crime scene investigation and cybercrime forensics. With IBM reporting 1.5 million U.S. cyber attacks monitored in 2013, IT and security professionals can take a few tips from law enforcement about securing, assessing and reporting at a cyberattack crime scene.

TOPICS:
Advertisement
Cybersecurity experts raise doubts whether the National Security Agency has successfully deployed an automated hack-back system known as MonsterMind, as revealed by former NSA contractor Edward Snowden in an interview with Wired.

Experts Raise Doubts about MonsterMind

August 18, 2014 10:23 am | by Eric Chabrow, Gov Info Security | Comments

Cybersecurity experts raise doubts whether the National Security Agency has successfully deployed an automated hack-back system known as MonsterMind, as revealed by former NSA contractor Edward Snowden in an interview with Wired.     

TOPICS:
Security researchers have uncovered evidence of escalating cyber attacks emanating from Syria which use tried and tested techniques to download remote access trojans (RATs) onto victim PCs.

Syrian Hackers Ramp Up RAT Attacks

August 18, 2014 10:07 am | by Phil Muncaster, Infosecurity Magazine | Comments

Security researchers have uncovered evidence of escalating cyber attacks emanating from Syria which use tried and tested techniques to download remote access trojans (RATs) onto victim PCs.                 

TOPICS:

German Spies Capture Kerry, Clinton Conversations

August 18, 2014 9:40 am | by Michael Nienaber, Reuters | Comments

Germany's foreign intelligence agency recorded at least one phone conversation held by U.S. Secretary of State John Kerry, a German magazine said on Saturday, potentially embarrassing Berlin which has reprimanded Washington for its surveillance.

TOPICS:
A group of journalists has reported the existence of the "Hacienda" spy program. According to this report, five western intelligence agencies are using the Hacienda software to identify vulnerable servers across the world in order to control them and use

Researchers Develop Defense Software 'TCP Stealth'

August 18, 2014 9:00 am | by TUM | Comments

A group of journalists has reported the existence of the "Hacienda" spy program. According to this report, five western intelligence agencies are using the Hacienda software to identify vulnerable servers across the world in order to control them and use them for their own purposes. Scientists have developed free software that can help prevent this kind of identification and thus the subsequent capture of systems.

TOPICS:
The FBI's premier cybersquad has focused attention on computer-based crime in recent months by helping prosecutors charge five Chinese army intelligence officials with stealing trade secrets from major companies and by snaring a Russian-led hacking ring t

Premier FBI Cybersquad in Pittsburgh to Add Agents

August 18, 2014 8:46 am | by Joe Mandak, Associated Press | Comments

The FBI's premier cybersquad has focused attention on computer-based crime in recent months by helping prosecutors charge five Chinese army intelligence officials with stealing trade secrets from major companies and by snaring a Russian-led hacking ring that pilfered $100 million from bank accounts worldwide.

TOPICS:
Advertisement

Cybersecurity Remains a Gray Area for NATO

August 15, 2014 11:41 am | by Tom Risen, U.S. News & World Report | Comments

The North Atlantic Treaty Organization is expected to update its charter in September to address cybersecurity while leaving open the question of whether hacks count as an attack on its member states that could start a war. Leaving the definition open could cool fears about whether hackers could start a war.

TOPICS:

Mathematical Obfuscation against Hackers is Focus of New Cybersecurity Center

August 15, 2014 11:21 am | by Jeremy Hsu, IEEE Spectrum | Comments

Turning computer code into a kind of math puzzle may hold the key to protecting software from hackers. A consortium of universities developing the idea, called mathematical obfuscation, recently received a $5 million grant from the U.S. government as part of a broader cybersecurity initiative.

TOPICS:
Secure Channels Inc. has announced that none of the 155 hackers at the recent Black Hat USA 2014 Conference in Las Vegas who participated in a “Can You Break This” contest were able to hack the company’s new patented PKMS2 Encryption Technology.

Black Hat Hackers Fail to Crack Encryption Tech

August 15, 2014 11:02 am | by Secure Channels Inc. | Comments

Secure Channels Inc. has announced that none of the 155 hackers at the recent Black Hat USA 2014 Conference in Las Vegas who participated in a “Can You Break This” contest were able to hack the company’s new patented PKMS2 Encryption Technology.

TOPICS:
Mixing upper and lower case letters, numbers and special characters doesn’t make passwords any harder for hackers to crack, only increasing the number of characters does, according to new research from Trustwave.

Longer Passwords are Harder to Crack

August 15, 2014 10:36 am | by Phil Muncaster, Infosecurity Magazine | Comments

Mixing upper and lower case letters, numbers and special characters doesn’t make passwords any harder for hackers to crack, only increasing the number of characters does, according to new research from Trustwave.           

TOPICS:
The hottest topic in the insurance world today is cyber risk insurance, or coverage for the response to and fallout from cyber crime and breaches. Although high–profile breaches have led to skyrocketing interest in cyber insurance, they have also highligh

Lack of Incident Response Holding Back Cyber Insurance Market

August 14, 2014 12:21 pm | by Craig Carpenter, Property Casualty 360 | Comments

The hottest topic in the insurance world today is cyber risk insurance, or coverage for the response to and fallout from cyber crime and breaches. Although high–profile breaches have led to skyrocketing interest in cyber insurance, they have also highlighted a glaring weakness in insurance companies’ ability to price — and therefore offer — such coverage: the lack of incident resolution expertise.

TOPICS:
Even as the U.S. Air Force Academy has reduced the number of majors it offers recently, it has instituted a new program aimed at helping the Air Force fly, fight and win in cyberspace.

US Air Force Academy Introduces Computer Network Security Major

August 14, 2014 11:44 am | by U.S. Air Force | Comments

Even as the U.S. Air Force Academy has reduced the number of majors it offers recently, it has instituted a new program aimed at helping the Air Force fly, fight and win in cyberspace.                   

TOPICS:
Edward Snowden has made us painfully aware of the government’s sweeping surveillance programs over the last year. But a new program, currently being developed at the NSA, suggests that surveillance may fuel the government’s cyberdefense capabilities, too.

The NSA MonsterMind Bot Could Wage Cyber War Autonomously

August 14, 2014 10:55 am | by Kim Zetter, Wired | Comments

Edward Snowden has made us painfully aware of the government’s sweeping surveillance programs over the last year. But a new program, currently being developed at the NSA, suggests that surveillance may fuel the government’s cyberdefense capabilities, too.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading