Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Cyber Crime Costs Global Economy $445B

June 9, 2014 9:57 am | by Help Net Security | Comments

Cyber crime has a significant impact on economies worldwide. A new report from the Center for Strategic and International Studies (CSIS) concludes that cyber crime costs businesses approximately $445 billion worldwide, with an impact on approximately 150,000 jobs in the EU and 200,000 jobs in the U.S.

TOPICS:

Town Refuses to Pay Crypto Ransom for Police Computers

June 9, 2014 9:35 am | by Dan Goodin, Ars Technica | Comments

The town manager of a hamlet in south eastern New Hampshire has defied demands that he pay a ransom to recover police department computer files taken hostage by Cryptowall, a newer piece of malware that encrypts hard drive contents of infected machines until victims pay for them to be decrypted.

TOPICS:

German Spy Agency Comes Clean on Secret Sites

June 6, 2014 9:53 am | by Frank Jordans, Associated Press | Comments

Germany's foreign intelligence agency has officially lifted the lid on some of its worst-kept secrets, acknowledging that half a dozen facilities around the country are in fact spy stations — as anyone with Internet access could already figure out.

TOPICS:
Advertisement

Queen Proposes Life Sentences for Hackers

June 6, 2014 9:43 am | by Tom Brewster, the Guardian | Comments

The UK government has said it wants to hand out life sentences to anyone found guilty of a cyber attack that has a catastrophic effect, under plans announced in the Queen's speech.                   

TOPICS:

Vodafone Reveals Global Scale of Telephone Surveillance

June 6, 2014 9:22 am | by Kate Holton and Sarah Young, Reuters | Comments

The world's second-biggest mobile phone company Vodafone revealed government agencies in six unidentified countries use its network to listen to and record customers' calls, showing the scale of telecom eavesdropping around the world.     

TOPICS:

Cellebrite Delves Deep into Cell Phone Memory

June 5, 2014 2:32 pm | by Ari Rabinovich, Reuters | Comments

Israel's Cellebrite has seen a huge jump in sales of its mobile forensic technology as smartphones have become an increasingly vital tool for investigators in solving crimes across the world.                 

TOPICS:

Google Plots End-to-End Messaging Encryption

June 5, 2014 10:10 am | by Infosecurity | Comments

Google is planning to beef up privacy and security options for its Chrome browser with a new feature it calls End to End; it’s a Chrome extension that will encrypt email messaging data from the browser to the intended recipient.      

TOPICS:

The Real Costs of Spying

June 5, 2014 9:44 am | by Danielle Kehl and Kevin Bankston, CNN | Comments

On the first anniversary of the first published leaks about the National Security Agency's far-reaching surveillance programs, the discussions remain focused on the tradeoffs between individual privacy and U.S. security.         

TOPICS:
Advertisement

US Marshals Seize Police Surveillance Records

June 5, 2014 9:13 am | by Kim Zetter, Wired | Comments

A routine request in Florida for public records regarding the use of a surveillance tool known as stingray took an extraordinary turn recently when federal authorities seized the documents before police could release them.       

TOPICS:

US General Says SKorea Databases Hacked

June 5, 2014 8:48 am | by Youkyung Lee, Associated Press | Comments

The top U.S. military official in South Korea said a hacking incident might have compromised the personal information of thousands of South Koreans employed by the American command.                   

TOPICS:

DARPA's Cyber Grand Challenge Offers $3.75M in Prizes

June 4, 2014 11:16 am | by Help Net Security | Comments

Computer security experts from academia, industry and the larger security community have organized themselves into more than 30 teams to compete in DARPA's Cyber Grand Challenge, a tournament designed to speed the development of automated security systems able to defend against cyber attacks as fast as they are launched.

TOPICS:

Detecting Malicious Software in Networked Computers and Data

June 4, 2014 10:34 am | by Lynn Nystrom, Virginia Tech | Comments

New research has unveiled the causal relations among computer network events. The work effectively isolates infected computer hosts and detects in advance stealthy malware also known as malicious software.             

TOPICS:

Taking Down One Botnet Killed 98% Of Australian Wire Fraud

June 4, 2014 10:24 am | by Luke Hopewell, Gizmodo Australia | Comments

For years the Microsoft Global Cybercrime Center, along with its 100 internet security spooks around the world — have worked to take down fraudulent software operations, botnets and baddies compromising the privacy and security of Microsoft customers. It was one particular botnet, however, that had a profound impact on the way Australians deal with their money online.

TOPICS:

Navy Puzzle Challenge Blends Social Media, Cryptology

June 3, 2014 10:19 am | by Kathleen Hickey, GCN | Comments

The Navy recently announced the winners of its cryptology puzzle game challenge: “Project Architeuthis.” The puzzle, consisting of daily clues posted on Facebook, targets the cryptology technician community and was an attempt to raise awareness of the Information Dominance Corps.

TOPICS:

GameOver Zeus Botnet Disrupted

June 3, 2014 9:58 am | by Joe Mandak and Eric Tucker, Associated Press | Comments

A band of hackers implanted viruses on hundreds of thousands of computers around the world, secretly seized customer bank information and stole more than $100 million from businesses and consumers, the Justice Department said Monday in announcing charges against the Russian man accused of masterminding the effort.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading