Advertisement
Cybersecurity
Subscribe to Cybersecurity

The Lead

Students supported through California State University, San Bernardino's SFS program are being educated in cyber intelligence to deal proactively with cyber threats — to predict malicious behavior before it happens. Doing so draws not only on a background

Cybersecurity Not Just about Hackers

October 31, 2014 10:22 am | by Maria Zacharias, The National Science Foundation | News | Comments

Students supported through California State University, San Bernardino's SFS program are being educated in cyber intelligence to deal proactively with cyber threats — to predict malicious behavior before it happens. Doing so draws not only on a background in computer and information science, but also on an understanding of human behavior and psychology and the political and economic environment.

Organizations Still Unprepared for Cyber Attacks

October 30, 2014 11:14 am | by EY | News | Comments

Most organizations are facing rising threats in their information security risk environment, but...

Biggest Cybersecurity Exercise Ever Happening in Europe

October 30, 2014 10:11 am | by Help Net Security | News | Comments

More than 200 organizations and 400 cybersecurity professionals from 29 European countries...

Georgia Tech Releases 2015 Emerging Cyber Threats Report

October 29, 2014 10:30 am | by Georgia Institute of Technology | News | Comments

In its latest Emerging Cyber Threats Report, Georgia Tech warns about loss of privacy;...

View Sample

SUBSCRIBE TO FREE DFI News EMAIL NEWSLETTER

American Airlines Flight 136 from LAX to London was delayed recently after someone in the vicinity picked an inappropriate name for their Wi-Fi hotspot.

'Al-Quida Free Terror Nettwork' Wi-Fi Hotspot Grounds Plane

October 29, 2014 9:56 am | by Lee Munson | Blogs | Comments

American Airlines Flight 136 from LAX to London was delayed recently after someone in the vicinity picked an inappropriate name for their Wi-Fi hotspot.                            

Book Excerpt: Checklist: Building a Penetration Testing Lab

October 29, 2014 8:48 am | by Bruce Middleton | CRC Press/Taylor & Francis Group LLC | Articles | Comments

This checklist can help you to build a penetration testing lab. To successfully set up your lab will require attention to detail, redundancy, and a littel bit of paranoia.                   

The US Senate has a few privacy-related questions it would like to ask the people in charge at Whisper, the self-proclaimed "safest place on the internet."

US Senate Calls Whisper In for Serious Questioning on User Tracking

October 27, 2014 11:33 am | by Lisa Vaas | Blogs | Comments

The U.S. Senate has a few privacy-related questions it would like to ask the people in charge at Whisper, the self-proclaimed "safest place on the internet."                           

Advertisement
FBI Director James Comey has compared Chinese hackers to a "drunk burglar" — not so subtle, but prolific and reckless enough to cost US companies billions each year.

White Hat Hackers Employed to Find Vulnerabilities

October 24, 2014 9:42 am | News | Comments

Cyber-crime is big business in the digital age, so a Bay Area security firm has hired a sophisticated group of hackers to break into computer systems. “White-hat hackers” deliberately break into computer systems and digital devices to find vulnerabilities before “black-hat hackers” can exploit them.  

The sophisticated electronic components that are making modern cars safer, greener, and smarter are also making them dangerously vulnerable to cyber attacks.

Carmakers Ignore Hacking Risk

October 24, 2014 9:37 am | News | Comments

As high-tech features like adaptive cruise control, automatic braking and automatic parallel parking systems make cars smarter, it's also making them more vulnerable to hackers – a risk that an automotive security researcher says carmakers appear to be ignoring.

How Host-Based Forensics Told the Whole Story: Criminal Investigation of a DDoS Attack

October 24, 2014 8:10 am | Webinars

This webcast will walk through the details of a real-life Distributed Denial of Service (DDoS) attack, where Internet evidence recovered during the investigation was vital to the outcome of the case.

Your medical information is worth 10 times more than your credit card number on the black market. Security experts say cyber criminals are increasingly targeting the $3 trillion U.S. healthcare industry, which has many companies still reliant on aging com

US Investigating Cybersecurity Flaws in Medical Devices

October 23, 2014 11:52 am | News | Comments

The U.S. Department of Homeland Security is investigating about two dozen cases of suspected cybersecurity flaws in medical devices and hospital equipment that officials fear could be exploited by hackers, a senior official at the agency told Reuters.

Four Ways Snowden Got it Wrong

October 23, 2014 11:29 am | by Dave Aitel | Blogs | Comments

As a former ‘research scientist’ at the National Security Agency, I feel compelled to respond to James Bamford’s exclusive interview with Edward Snowden that appeared in the September issue of Wired magazine. Many of the factual assertions about the NSA and intelligence community that were included in Bamford’s article, and previous Snowden “disclosures,” are highly questionable.

Advertisement

Justice Department Expands Fight Against Cybercrime

October 22, 2014 11:08 am | News | Comments

The Justice Department is expanding its National Security division to take on threats to the country from state-sponsored economic espionage and cybercrime, assistant attorney general for national security John Carlin said Tuesday.

Cost of Cybercrime on the Rise

October 21, 2014 6:57 am | News | Comments

According to the 2014 Cost of Cyber Crime Study, the average annualized cost of cybercrime has reached $12.7 million in the U.S., a 96 percent increase since the study was launched five years ago.                    

The sophisticated electronic components that are making modern cars safer, greener, and smarter are also making them dangerously vulnerable to cyber attacks.

Connected Cars Tough Fight with Cyber Crime

October 15, 2014 12:23 pm | by Jai Vijayan, Information Week | News | Comments

The sophisticated electronic components that are making modern cars safer, greener, and smarter are also making them dangerously vulnerable to cyber attacks.                           

In an interview with ISMG, Garet Moravec, an independent security consultant, offers a hypothetical example of thwarting Chinese hackers trying to breach a defense contractor's systems to pilfer designs on a jet fighter by using a honeypot, a trap contain

Hackers Manipulated as Advanced Threat Response

October 15, 2014 11:09 am | by Eric Chabrow, Gov Info Security | News | Comments

In an interview with ISMG, Garet Moravec, an independent security consultant, offers a hypothetical example of thwarting Chinese hackers trying to breach a defense contractor's systems to pilfer designs on a jet fighter by using a honeypot, a trap containing fake information that's designed to look like part of a network.

It's not just big businesses like JPMorgan Chase, Target and Home Depot that get hacked. Small companies suffer from intrusions into their computer systems, too.

Hacking a Big Danger for Small Businesses

October 14, 2014 10:34 am | by Joyce Rosenberg, Associated Press | News | Comments

It's not just big businesses like JPMorgan Chase, Target and Home Depot that get hacked. Small companies suffer from intrusions into their computer systems, too.                         

Advertisement
Another day, another breach, and more credit cards are on the open market. I’m not sure what the thieves are going to be doing with the credit cards at this point but let’s take a look at where we are going and take a moment to reflect on what we’re doing

Strategic Incident Response to Increase Information Security after Breaches

October 13, 2014 11:10 am | by Samuel Liles | Blogs | Comments

Another day, another breach, and more credit cards are on the open market. I’m not sure what the thieves are going to be doing with the credit cards at this point but let’s take a look at where we are going and take a moment to reflect on what we’re doing here in infosec land.

A little-known Department of Homeland Security program for providing liability protection to US firms in the wake of terrorist or other attacks could also provide shelter for firms facing legal action in the wake of a cyber attack.

DHS Anti-Terrorism Program Could Provide Cyberattack Liability Protection

October 9, 2014 12:29 pm | by Kelly Jackson Higgins | Blogs | Comments

A little-known Department of Homeland Security program for providing liability protection to US firms in the wake of terrorist or other attacks could also provide shelter for firms facing legal action in the wake of a cyber attack.     

If we have learned anything about payment technology over the past decade, it’s that there will always be a new technology or a new scheme that will be championed as a way to reduce the growing rise of payment card fraud.

Tokenization: 6 Reasons the Card Industry Should be Wary

October 8, 2014 9:58 am | by Pat Carroll | Blogs | Comments

If we have learned anything about payment technology over the past decade, it’s that there will always be a new technology or a new scheme that will be championed as a way to reduce the growing rise of payment card fraud.        

Former U.S. Homeland Security secretary Tom Ridge has launched a cyber crime insurance product in collaboration with syndicates operating at the Lloyd's of London insurance market, Ridge's new insurance firm says.

Former US Security Chief Launches Cybercrime Insurance

October 7, 2014 11:42 am | by Reuters | News | Comments

Former U.S. Homeland Security secretary Tom Ridge has launched a cyber crime insurance product in collaboration with syndicates operating at the Lloyd's of London insurance market, Ridge's new insurance firm says.           

The city has scuttled an outdoor media company's project slated to install in payphone booths thousands of transmitters that could track people's movements by sending signals to their smartphones.

New York Cancels Phone Booth Transmitter Program

October 7, 2014 10:28 am | by Jonathan Lemire, Associated Press | News | Comments

The city has scuttled an outdoor media company's project slated to install in payphone booths thousands of transmitters that could track people's movements by sending signals to their smartphones. Titan, which sells ad space in more than 5,000 phone kiosks, had received approval from the city to place the transmitters, known as beacons, in the booths, and 500 had already been installed around Manhattan.

Cybersecurity breaches such as those at Target, Home Depot, and JPMorgan Chase are expensive and embarrassing. While attacks may come from outside hackers, the FBI recently issued a warning that internal hacking from current and former employees poses the

Underpaid Employees are a Cybersecurity Risk

October 6, 2014 11:29 am | by Allison Schrager, Bloomberg Businessweek | News | Comments

Cybersecurity breaches such as those at Target, Home Depot, and JPMorgan Chase are expensive and embarrassing. While attacks may come from outside hackers, the FBI recently issued a warning that internal hacking from current and former employees poses the biggest threat — and is on the rise. 

The National Institute of Standards and Technology (NIST) has published its NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0, a document that reflects advances in smart grid technologies and developments from NIST’s collab

NIST Releases Final Version of Smart Grid Framework, Update 3.0

October 2, 2014 9:25 am | by NIST | News | Comments

The National Institute of Standards and Technology (NIST) has published its NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0, a document that reflects advances in smart grid technologies and developments from NIST’s collaborative work with industry stakeholders. Revisions to its guidelines for smart grid cybersecurity are available as well.

Days after GM announced the appointment of a chief security officer, automotive cybersecurity has gotten another boost with a $4 million Series A funding shot for car-focused Argus Cyber Security.

Investors Drive into Car Cybersecurity

September 30, 2014 10:06 am | by Tara Seals, Infosecurity Magazine | News | Comments

Days after GM announced the appointment of a chief security officer, automotive cybersecurity has gotten another boost with a $4 million Series A funding shot for car-focused Argus Cyber Security.               

Organized Crime Opting for Hidden Internet Service Industry

September 29, 2014 9:51 am | by Europol | News | Comments

The 2014 iOCTA (Internet Organised Crime Threat Assessment), published by Europol's European Cybercrime Centre (EC3), describes an increased commercialization of cyber crime. A service-based criminal industry is developing, in which specialists in the virtual underground economy develop products and services for use by other criminals. 

NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence

September 25, 2014 8:16 am | by NIST | News | Comments

The U.S. Commerce Department’s National Institute of Standards and Technology has awarded a contract to operate its first Federally Funded Research and Development Center, which will support the National Cybersecurity Center of Excellence.   

In a big step for securing critical information systems, such as medical records in clinical settings, Dartmouth College researchers have created a new approach to computer security that authenticates users continuously while they are using a terminal and

ZEBRA Bracelet Strengthens Computer Security

September 23, 2014 10:40 am | by Dartmouth College | News | Comments

In a big step for securing critical information systems, such as medical records in clinical settings, researchers have created a new approach to computer security that authenticates users continuously while they are using a terminal and automatically logs them out when they leave or when someone else steps in to use their terminal.

After a security incident is detected tremendous resources are spent in the forensic investigation trying to figure out what exactly happened and what data, if any, was compromised. If the forensic investigation doesn’t yield definitive results fairly qui

Avoid Wasting Time During a Breach Investigation

September 23, 2014 10:08 am | by Rekha Shenoy, Tripwire | News | Comments

After a security incident is detected tremendous resources are spent in the forensic investigation trying to figure out what exactly happened and what data, if any, was compromised. If the forensic investigation doesn’t yield definitive results fairly quickly the organization is left with no choice but to assume the worst.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading