Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Mixing upper and lower case letters, numbers and special characters doesn’t make passwords any harder for hackers to crack, only increasing the number of characters does, according to new research from Trustwave.

Longer Passwords are Harder to Crack

August 15, 2014 10:36 am | by Phil Muncaster, Infosecurity Magazine | Comments

Mixing upper and lower case letters, numbers and special characters doesn’t make passwords any harder for hackers to crack, only increasing the number of characters does, according to new research from Trustwave.           

TOPICS:
The hottest topic in the insurance world today is cyber risk insurance, or coverage for the response to and fallout from cyber crime and breaches. Although high–profile breaches have led to skyrocketing interest in cyber insurance, they have also highligh

Lack of Incident Response Holding Back Cyber Insurance Market

August 14, 2014 12:21 pm | by Craig Carpenter, Property Casualty 360 | Comments

The hottest topic in the insurance world today is cyber risk insurance, or coverage for the response to and fallout from cyber crime and breaches. Although high–profile breaches have led to skyrocketing interest in cyber insurance, they have also highlighted a glaring weakness in insurance companies’ ability to price — and therefore offer — such coverage: the lack of incident resolution expertise.

TOPICS:
Even as the U.S. Air Force Academy has reduced the number of majors it offers recently, it has instituted a new program aimed at helping the Air Force fly, fight and win in cyberspace.

US Air Force Academy Introduces Computer Network Security Major

August 14, 2014 11:44 am | by U.S. Air Force | Comments

Even as the U.S. Air Force Academy has reduced the number of majors it offers recently, it has instituted a new program aimed at helping the Air Force fly, fight and win in cyberspace.                   

TOPICS:
Advertisement
Edward Snowden has made us painfully aware of the government’s sweeping surveillance programs over the last year. But a new program, currently being developed at the NSA, suggests that surveillance may fuel the government’s cyberdefense capabilities, too.

The NSA MonsterMind Bot Could Wage Cyber War Autonomously

August 14, 2014 10:55 am | by Kim Zetter, Wired | Comments

Edward Snowden has made us painfully aware of the government’s sweeping surveillance programs over the last year. But a new program, currently being developed at the NSA, suggests that surveillance may fuel the government’s cyberdefense capabilities, too.

TOPICS:
Virtual environments are a tool that security researchers and security software use to automatically analyze and detect malware. But according to Symantec research, virtual machines (VMs) are becoming more common in enterprise operational environments—so

Malware No Longer Avoids Virtual Machines

August 14, 2014 10:00 am | by Tara Seals, Infosecurity Magazine | Comments

Virtual environments are a tool that security researchers and security software use to automatically analyze and detect malware. But according to Symantec research, virtual machines (VMs) are becoming more common in enterprise operational environments — so malware authors are learning to write their code to attack that infrastructure more effectively while avoiding detection.

TOPICS:
A spate of high-profile security breaches and attacks means that security practitioners find themselves thinking a lot about incident response. A new SANS incident response survey looks at how practitioners are dealing with these numerous incidents.

How Incident Response Fights Back

August 13, 2014 10:14 am | by SANS | Comments

A spate of high-profile security breaches and attacks means that security practitioners find themselves thinking a lot about incident response. A new SANS incident response survey looks at how practitioners are dealing with these numerous incidents.

TOPICS:
Lean operations and a lack of technical staff make non-governmental organizations a prime, and relatively soft, target for well-funded adversaries, according to an academic study of a four-year campaign targeting one such group.

Activists are Easy Targets for Nation-state Attackers

August 13, 2014 9:38 am | by Robert Lemos, Ars Technica | Comments

Lean operations and a lack of technical staff make non-governmental organizations a prime, and relatively soft, target for well-funded adversaries, according to an academic study of a four-year campaign targeting one such group.      

TOPICS:

Snowden Left Clues the NSA Couldn't Find

August 13, 2014 9:27 am | by Andy Greenberg, Wired | Comments

If the NSA still doesn’t know the full extent of the greatest leak of secrets in its history, it’s not because of Edward Snowden’s attempts to cover his tracks. On the contrary, the NSA’s most prolific whistleblower now claims he purposefully left a trail of digital bread crumbs designed to lead the agency directly to the files he’d copied.

TOPICS:
Advertisement
Hackers can be tough opponents because the best of them share ideas online about new ways to attack networks and how to hide from law enforcement. Gangs in nations like Russia or China can be particularly resourceful and dangerous — especially since gover

Battling Hackers Like Organized Crime

August 12, 2014 11:39 am | by Tom Risen. U.S. News & World Report | Comments

Hackers can be tough opponents because the best of them share ideas online about new ways to attack networks and how to hide from law enforcement. Gangs in nations like Russia or China can be particularly resourceful and dangerous — especially since governments there are secretly sponsoring hackers' efforts and protecting them from international law enforcement.

TOPICS:

Espionage Programs Linked to Spying on Former Soviet Targets

August 12, 2014 11:08 am | by Robert Lemos, Ars Technica | Comments

A one-two combination of malware programs has infiltrated the embassies and government systems of a number of former Eastern Bloc nations as well as European targets, according to a technical analysis by security researchers.       

TOPICS:
Computer forensic and cybersecurity tools are getting smarter and easier to use by the week, but I'd like to offer a contrarian view and tell you that it's not necessarily a good thing. Better tools — or rather, better tool marketing—can lull you into a f

The Myth of the 'Find All Evidence' Button

August 12, 2014 10:12 am | by John I., LinkedIn | Comments

Computer forensic and cybersecurity tools are getting smarter and easier to use by the week, but I'd like to offer a contrarian view and tell you that it's not necessarily a good thing. Better tools — or rather, better tool marketing — can lull you into a false sense of security.

TOPICS:
Researchers have discovered click fraud malware designed to “hide in plain sight” and evade traditional security tools by embedding data into an image file.

Click Fraud Malware Found Lurking Inside Image Files

August 12, 2014 8:12 am | by Phil Muncaster, Infosecurity Magazine | Comments

Researchers have discovered click fraud malware designed to “hide in plain sight” and evade traditional security tools by embedding data into an image file.                           

TOPICS:
At this year's edition of the Black Hat security conference, a group of researchers has shown how extremely easy is to hack into the smart thermostats manufactured by Nest.

Spies Can Turn Smart Nest Thermostat

August 11, 2014 10:29 am | by Zeljka Zorz, Help Net Security | Comments

At this year's edition of the Black Hat security conference, a group of researchers has shown how extremely easy is to hack into the smart thermostats manufactured by Nest.                      

TOPICS:
Alarmed by mounting cyber threats around the world and across industries, a growing number of security experts see aggressive government action as the best hope for averting disaster.

Security Experts Call for Government Action against Cyber Threats

August 11, 2014 10:12 am | by Joseph Menn, Reuters | Comments

Alarmed by mounting cyber threats around the world and across industries, a growing number of security experts see aggressive government action as the best hope for averting disaster.                   

TOPICS:
Network breaches are inevitable. It’s what happens next that really matters, said renowned cryptographic expert Bruce Schneier during the Black Hat security conference.

Incident Response Best Practice and Automation

August 11, 2014 10:00 am | by Fahmida Rashid, Infosecurity Magazine | Comments

Network breaches are inevitable. It’s what happens next that really matters, said renowned cryptographic expert Bruce Schneier during the Black Hat security conference.                       

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading