Advertisement
Cybersecurity
Subscribe to Cybersecurity

The Lead

Gathering and understanding cyber intelligence is the work of BlackForest, a new open source intelligence gathering system developed by information security specialists at the Georgia Tech Research Institute (GTRI). By using such information to create a t

Threat Information System Warns of Impending Cyber Attacks

July 31, 2014 9:46 am | by Georgia Institute of Technology | News | Comments

Gathering and understanding cyber intelligence is the work of BlackForest, a new open source intelligence gathering system developed by information security specialists at the Georgia Tech Research Institute (GTRI). By using such information to create a threat picture, BlackForest helps corporations, government agencies and nonprofit organizations battle increasingly-sophisticated threats to their networks.

Feds Admit Cooperation Remains Obstacle with Corporations, Cyber Threats

July 31, 2014 9:26 am | by Tom Fontaine, Trib LIVE | News | Comments

A key to reducing cyber crime is getting victims — often major corporations — to cooperate with...

Former NSA Director to File Cybersecurity Patents in the Private World

July 30, 2014 9:08 am | by Megan Guess, Ars Technica | News | Comments

In an interview with former National Security Agency Director General Keith Alexander, Foreign...

How to Build a Federal Information Security Team

July 29, 2014 10:01 am | by (ISC)2 Writers Bureau, Information Week | News | Comments

Federal Chief Information Security Officers (CISOs) and information security executives face a...

View Sample

SUBSCRIBE TO FREE DFI News EMAIL NEWSLETTER

It has been over a year since The Guardian reported the first story on the National Security Agency’s surveillance programs based on the leaks from former NSA contractor Edward Snowden, yet the national conversation remains largely mired in a simplistic d

Surveillance Costs: The NSA's Impact on the Economy, Internet Freedom & Cybersecurity

July 29, 2014 9:42 am | by Danielle Kehl,Kevin Bankston,Robyn Greene,Robert Morgus,New America Foundation | News | Comments

It has been over a year since The Guardian reported the first story on the National Security Agency’s surveillance programs based on the leaks from former NSA contractor Edward Snowden, yet the national conversation remains largely mired in a simplistic debate over the tradeoffs between national security and individual privacy. It is time to start weighing the overall costs and benefits more broadly.

Cybersecurity is being pushed in two directions. On the one hand, the growing complexity of information systems and the onslaught of threats facing them are putting a premium on speed. Automation is the future of security.

Security Automation: Are Humans Still Relevant?

July 28, 2014 10:38 am | by William Jackson | Blogs | Comments

Cybersecurity is being pushed in two directions. On the one hand, the growing complexity of information systems and the onslaught of threats facing them are putting a premium on speed. Automation is the future of security.       

Recently, a hacker who's been campaigning to make a point about Apple security by playing fast and loose with the now widely-accepted definition of "backdoor" struck gold when journalists didn't do their homework and erroneously reported a diagnostic mech

The Apple Backdoor that Wasn't

July 28, 2014 9:04 am | by Violet Blue | Blogs | Comments

Recently, a hacker who's been campaigning to make a point about Apple security by playing fast and loose with the now widely-accepted definition of "backdoor" struck gold when journalists didn't do their homework and erroneously reported a diagnostic mechanism as a nefarious, malfeasant, secret opening to their private data.

Advertisement
Hackers only need to find one weak point to steal valuable information. On the flip side, you need to account for every possible vulnerability across your entire infrastructure. Doesn't seem fair, but it's the world we live in

Hackers Only Need to Get It Right Once, Security Needs to Get It Right Every Time

July 25, 2014 10:46 am | by Chris Triolo, SC Magazine | News | Comments

Hackers only need to find one weak point to steal valuable information. On the flip side, you need to account for every possible vulnerability across your entire infrastructure. Doesn't seem fair, but it's the world we live in.       

Microsoft's Internet Explorer (IE) has become the most patched software   product, receiving more security patches in the first six months of this year   than Adobe or Oracle software, a report by Bromium Labs has found.

Internet Explorer is the 'Sweet Spot' for Cyber Criminals

July 25, 2014 10:25 am | by Lee Bell, the Inquirer | News | Comments

Microsoft's Internet Explorer (IE) has become the most patched software product, receiving more security patches in the first six months of this year than Adobe or Oracle software, a report by Bromium Labs has found.        

Ever posted a picture of your cat online? Unless your privacy settings avoid making APIs publicly available on sites like Flickr, Twitpic, Instagram or the like, there's a cat stalker who knows where your liddl' puddin' lives, and he's totally pwned your

Cat Stalker Knows Where Your Kitty Lives (and It's Your Fault)

July 25, 2014 9:29 am | by Lisa Vaas | Blogs | Comments

Ever posted a picture of your cat online? Unless your privacy settings avoid making APIs publicly available on sites like Flickr, Twitpic, Instagram or the like, there's a cat stalker who knows where your liddl' puddin' lives, and he's totally pwned your pussy by geolocating it.

How Hackers Hid a Money-mining Botnet in Amazon's Cloud

July 24, 2014 11:11 am | by Andy Greenberg, Wired | News | Comments

Hackers have long used malware to enslave armies of unwitting PCs, but security researchers Rob Ragan and Oscar Salazar had a different thought: Why steal computing power from innocent victims when there’s so much free processing power out there for the taking?

Security experts are warning that tens of thousands of WordPress sites have been compromised thanks to a known vulnerability in the MailPoet plug-in, leading to mass defacements, spam and outages.

Up to 50,000 WordPress Users Hit by MailPoet Malware Attack

July 24, 2014 11:01 am | by Infosecurity | News | Comments

Security experts are warning that tens of thousands of WordPress sites have been compromised thanks to a known vulnerability in the MailPoet plug-in, leading to mass defacements, spam and outages.               

Advertisement

Google Recruits Top PS3 Hacker for Project Zero

July 17, 2014 9:16 am | by Charlie Osborne | Blogs | Comments

Google has hired a prolific hacker by the name of George Hotz to join the Project Zero team. Hotz is well-known for hacking Sony's PlayStation 3 and Apple's iPhone.                         

Approximate Matching Helps Digital Forensics Find Similar Artifacts

July 17, 2014 8:32 am | by Kim Mays, IT Business Edge | News | Comments

According to the National Institute of Standards and Technology, approximate matching is a technology that can be used in a variety of settings, including digital forensics, security monitoring and data filtering. It involves locating similarities among pieces of digital data to match objects that are alike or to find objects that contain other objects.

Payment Card Data Theft: Tips for Small Business

July 16, 2014 8:56 am | by Chris Nutt | Blogs | Comments

For small businesses looking to reduce their exposure to data theft the good news is the advantage of being small.                                       

Google Forms Zero-day Hacking Team

July 15, 2014 11:12 am | by Kelly Jackson Higgins, Dark Reading | News | Comments

Google has revealed a new white-hat security team it has formed that will root out vulnerabilities in all software that touches the Internet. Google has revealed a new white-hat security team it has formed that will root out vulnerabilities in all software that touches the Internet.

Insurers Try to Get a Grip on Growing Cyber Risk Market

July 14, 2014 11:05 am | by Leigh Thomas and Jim Finkle, Reuters | News | Comments

Insurers are eagerly eyeing exponential growth in the tiny cyber coverage market but their lack of experience and skills handling hackers and data breaches may keep their ambitions in check.                 

Advertisement

Chinese Man Hacks Military Data from US Computers

July 14, 2014 10:32 am | by Julia Watson, Associated Press | News | Comments

U.S. authorities have charged a Chinese businessman with hacking into the computer systems of U.S. companies with large defense contracts, including Boeing, to steal data on military projects, including some of the latest fighter jets, officials have said.

Linkz for SIEM

July 14, 2014 9:52 am | by Corey Harrell | Blogs | Comments

Security information and event management (SIEM) has been an area where I have spent considerable time researching. My research started out as curiosity to see if the technology could solve some problems then continued to get organization buy-in followed by going all in to architect, implement, and manage a SIEM for my organization.

China Says iPhone is a Threat to National Security

July 11, 2014 11:04 am | by Reuters | News | Comments

Chinese state media has branded Apple Inc's iPhone a threat to national security because of the smartphone's ability to track and time-stamp user locations.                           

The Hazards Of Probing The Internet's Dark Side

July 11, 2014 10:49 am | by Editor | Blogs | Comments

Late last year, hackers breached Target's data security and stole information from millions of credit cards. Brian Krebs, who writes about cyber crime and computer security for his blog, Krebs on Security, broke the story. A few days later, he broke the story of a credit card breach at Neiman Marcus.

US and UK Consumers Avoid Pirated Content

July 11, 2014 9:55 am | by Infosecurity | News | Comments

Illegally obtaining TV and movies is almost endemic in the Asia-Pacific region though.                                               

Female Cybersleuths Hacking Into Security Tech

July 7, 2014 10:16 am | News | Comments

Tiffany Rad is turning the gender stereotypes in the software industry on their head. Rad is a “white hat,” a hacker who specializes in looking for security holes so they can be fixed. The attorney turned her computer hacking hobby into a career in 2008, when she submitted a research proposal to an underground security conference in New York.

US to Ask China to Restart Cyber Working Group

July 1, 2014 12:20 pm | by Matthew Pennington, Associated Press | News | Comments

The United States wants to restart a cybersecurity working group that China shut down after the U.S. indicted five Chinese military officers on charges of hacking into American companies' computers to steal trade secrets.        

Embedded systems — small computer systems built around microcontrollers — are becoming more common. But they remain vulnerable to security breaches.

Making the Internet of Things Safer

June 26, 2014 12:16 pm | by UC San Diego | News | Comments

As a result of the advance of the so-called Internet of Things, where all devices are connected and communicate with one another, embedded systems — small computer systems built around microcontrollers — are becoming more common. But they remain vulnerable to security breaches.

InfoSec teams should expand their rapid incident detection and response capabilities to mobile devices that have access to sensitive data.

Mobile Security Needs Incident Readiness

June 24, 2014 11:47 am | by AccessData | News | Comments

AccessData and Gigaom Research have released a report on the growing complexities of mobile security and the limitations of “preventive, policy-driven” solutions that are not designed to detect and respond to mobile security incidents that bypass defenses.

Newly Observed Domains (NOD), a new set of data solutions that provide real-time actionable insights on young domain names.

Farsight Security Launches at the FIRST Conference in Boston

June 24, 2014 11:17 am | by Farsight Security, Inc. | News | Comments

Farsight Security, Inc., has emerged from stealth mode at the FIRST Conference in Boston, Massachusetts to debut Newly Observed Domains (NOD), a new set of data solutions that provide real-time actionable insights on young domain names.   

Cybersecurity Center Earns DHS, NSA Designation

June 23, 2014 9:04 am | News | Comments

Kansas State University's cybersecurity center is receiving national recognition for its dedication to cutting-edge research. The university's Center for Information and Systems Assurance has been redesignated as a National Center of Academic Excellence in Information Assurance/Cyber Defense Research. The designation is from the U.S. Department of Homeland Security and the National Security Agency and is effective from 2014 to 2019.

The nationwide shortage of cybersecurity professionals — particularly for positions within the federal government — creates risks for national and homeland security, according to a new study from the RAND Corporation.

Shortage of Cybersecurity Professionals Poses Risk to National Security

June 19, 2014 8:13 am | by Rand Corporation | News | Comments

The nationwide shortage of cybersecurity professionals — particularly for positions within the federal government — creates risks for national and homeland security, according to a new study from the RAND Corporation.         

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading