Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Online Black Markets Evolve Since Silk Road's Downfall

Online Black Markets Evolve Since Silk Road's Downfall

September 11, 2014 12:05 pm | by Andy Greenberg, Wired | Comments

When the FBI tore down the billion-dollar drugs-and-contraband website Silk Road last October, its death made room for a new generation of black-market bazaars — many with better defenses against the Feds. Nearly a year later, more drugs are sold online than when the Silk Road ruled the dark web.

TOPICS:

Large ISP Fights DDoS Attacks

September 11, 2014 11:55 am | by Mirko Zorz, Help Net Security | Comments

DDoS attacks are a growing problem. In July, Arbor Networks released global DDoS attack data derived from its ATLAS threat monitoring infrastructure that shows a surge in volumetric attacks in the first half of 2014 with over 100 attacks larger than 100GB/sec reported.

TOPICS:

​Five Million 'Compromised' Google Accounts Leaked

September 11, 2014 10:30 am | by RT | Comments

A database of what appears to be some five million login and password pairs for Google accounts has been leaked to a Russian cyber security internet forum. It follows similar leaks of account data for popular Russian web services.     

TOPICS:
Advertisement
In light of one high profile "hack," is it fair to primarily blame Apple's current security setup? Is it really that easy to penetrate these defenses? In the name of security, we did a little testing using family members as guinea pigs. To demonstrate jus

How easy is it to mine Apple services, devices for data?

September 11, 2014 10:13 am | by Sean Gallagher, Ars Technica | Comments

In light of one high profile "hack," is it fair to primarily blame Apple's current security setup? Is it really that easy to penetrate these defenses? In the name of security, we did a little testing using family members as guinea pigs. To demonstrate just how much private information on an iPhone can be currently pulled from iCloud and other sources, we enlisted the help of a pair of software tools from Elcomsoft. 

TOPICS:
Through the Department of Homeland Security’s Transition to Practice (TTP) program, cybersecurity technologies developed at Sandia National Laboratories — and at other federal labs — now stand a better chance of finding their way into the real world.

Cyber Testing Contributes to DHS Transition to Practice

September 11, 2014 8:17 am | by Sandia National Laboratories | Comments

Through the Department of Homeland Security’s Transition to Practice (TTP) program, cybersecurity technologies developed at Sandia National Laboratories — and at other federal labs — now stand a better chance of finding their way into the real world.

TOPICS:

Home Depot Sued by Customer over Data Breach

September 10, 2014 11:10 am | by Reuters | Comments

Home improvement retailer Home Depot Inc (HD.N) has been sued over data breach by a customer, saying the company failed to properly safeguard customer data from hackers, a lawsuit filed in a Chicago federal court showed on Tuesday.     

TOPICS:
Microsoft has urged US District Judge Loretta Preska, the judge presiding over the case that sees the company refusing to hand some emails stored in its Dublin facility over to the US government, to find them in contempt.

Microsoft Refuses to Hand Over Emails, Held in Contempt

September 10, 2014 10:56 am | by Zeljka Zorz, Help Net Security | Comments

Microsoft has urged US District Judge Loretta Preska, the judge presiding over the case that sees the company refusing to hand some emails stored in its Dublin facility over to the US government, to find them in contempt.        

TOPICS:
Digital evidence, one of the fastest growing areas of forensic science, will now have its own subcommittee in the National Institute of Standards and Technology (NIST)-administered Organization of Scientific Area Committees (OSAC). NIST is establishing th

Forensic Subcommittee on Digital Evidence Added to NIST Committees

September 10, 2014 9:50 am | by NIST | Comments

Digital evidence, one of the fastest growing areas of forensic science, will now have its own subcommittee in the National Institute of Standards and Technology (NIST)-administered Organization of Scientific Area Committees (OSAC). NIST is establishing the OSAC to identify and develop national standards and guidelines for forensic science practitioners to strengthen forensic science in the United States.

TOPICS:
Advertisement

Salesforce Customers in Dyre Straits after Malware Warning

September 9, 2014 1:14 pm | by Phil Muncaster, Infosecurity Magazine | Comments

Cloud giant Salesforce.com has been forced to warn customers that remote access trojan (RAT) malware known as Dyre may be targeting their PCs to steal log-in credentials.                       

TOPICS:
The Defense Advanced Research Projects Agency (DARPA) is looking for new program analysis techniques and tools to enable analysts to identify vulnerabilities in algorithms implemented in software used by the US government, military, and economic entities.

DARPA Seeking Vulnerabilities in Software Algorithms

September 9, 2014 12:58 pm | by Zeljka Zorz, Help Net Security | Comments

The Defense Advanced Research Projects Agency (DARPA) is looking for new program analysis techniques and tools to enable analysts to identify vulnerabilities in algorithms implemented in software used by the US government, military, and economic entities.

TOPICS:

Cyber Forensics Group Reveals Smartphone App Vulnerabilities

September 9, 2014 12:47 pm | by Univ. of New Haven | Comments

Security flaws, breaches of privacy and additional vulnerabilities in chat, dating and other social media apps used by nearly one billion subscribers will be revealed by the University of New Haven's Cyber Forensics Research and Education Group (UNHcFREG).

TOPICS:
To hear the FBI tell it, tracking down the secret server behind the billion-dollar drug market known as the Silk Road was as easy as knocking on a door. But the technical side of the security community, who have long tracked the dark web’s experiments in

Did the FBI Hack the Location of Silk Road's Server?

September 9, 2014 12:19 pm | by Andy Greenberg, Wired | Comments

To hear the FBI tell it, tracking down the secret server behind the billion-dollar drug market known as the Silk Road was as easy as knocking on a door. But the technical side of the security community, who have long tracked the dark web’s experiments in evading law enforcement, don’t buy that simple story.

TOPICS:
As the trial of alleged Silk Road drug market creator Ross Ulbricht approaches, the defense has highlighted the mystery of how law enforcement first located the main Silk Road server in an Icelandic data center, despite the computer being hidden by the fo

FBI Pinpoints Silk Road's Server from Leaky Login Page

September 8, 2014 1:21 pm | by Andy Greenberg, Wired | Comments

As the trial of alleged Silk Road drug market creator Ross Ulbricht approaches, the defense has highlighted the mystery of how law enforcement first located the main Silk Road server in an Icelandic data center, despite the computer being hidden by the formidable anonymity software Tor. Was the FBI tipped off to the server’s location by the NSA, who used a secret and possibly illegal Tor-cracking technique?

TOPICS:
When one Atlanta, Georgia-based Internet provider was served a top-secret data request, there wasn't a federal agent in sight. Why? Because the order was served on a so-called "trusted third-party," which handles the request, served fresh from the secreti

Trusted Third Parties Deliver Data to the NSA

September 8, 2014 1:11 pm | by Zack Whittaker, ZDNet | Comments

When one Atlanta, Georgia-based Internet provider was served a top-secret data request, there wasn't a federal agent in sight. Why? Because the order was served on a so-called "trusted third-party," which handles the request, served fresh from the secretive Washington D.C.-based Foreign Intelligence Surveillance (FISA) Court. 

TOPICS:
The six-year old Conficker worm is still a major presence in the threat landscape, accounting for 38 percent of all detections in the first half of 2014, according to security vendor F-Secure’s latest Threat Report.

Conficker Most Reported Security Threat in 2014

September 8, 2014 12:45 pm | by Phil Muncaster, Infosecurity Magazine | Comments

The six-year old Conficker worm is still a major presence in the threat landscape, accounting for 38 percent of all detections in the first half of 2014, according to security vendor F-Secure’s latest Threat Report.          

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading