Advertisement
Cybersecurity
Subscribe to Cybersecurity

The Lead

Google Recruits Top PS3 Hacker for Project Zero

July 17, 2014 9:16 am | by Charlie Osborne | Blogs | Comments

Google has hired a prolific hacker by the name of George Hotz to join the Project Zero team. Hotz is well-known for hacking Sony's PlayStation 3 and Apple's iPhone.                         

Approximate Matching Helps Digital Forensics Find Similar Artifacts

July 17, 2014 8:32 am | by Kim Mays, IT Business Edge | News | Comments

According to the National Institute of Standards and Technology, approximate matching is a...

Payment Card Data Theft: Tips for Small Business

July 16, 2014 8:56 am | by Chris Nutt | Blogs | Comments

For small businesses looking to reduce their exposure to data theft the good news is the...

Google Forms Zero-day Hacking Team

July 15, 2014 11:12 am | by Kelly Jackson Higgins, Dark Reading | News | Comments

Google has revealed a new white-hat security team it has formed that will root out...

View Sample

SUBSCRIBE TO FREE DFI News EMAIL NEWSLETTER

Insurers Try to Get a Grip on Growing Cyber Risk Market

July 14, 2014 11:05 am | by Leigh Thomas and Jim Finkle, Reuters | News | Comments

Insurers are eagerly eyeing exponential growth in the tiny cyber coverage market but their lack of experience and skills handling hackers and data breaches may keep their ambitions in check.                 

Chinese Man Hacks Military Data from US Computers

July 14, 2014 10:32 am | by Julia Watson, Associated Press | News | Comments

U.S. authorities have charged a Chinese businessman with hacking into the computer systems of U.S. companies with large defense contracts, including Boeing, to steal data on military projects, including some of the latest fighter jets, officials have said.

Linkz for SIEM

July 14, 2014 9:52 am | by Corey Harrell | Blogs | Comments

Security information and event management (SIEM) has been an area where I have spent considerable time researching. My research started out as curiosity to see if the technology could solve some problems then continued to get organization buy-in followed by going all in to architect, implement, and manage a SIEM for my organization.

Advertisement

China Says iPhone is a Threat to National Security

July 11, 2014 11:04 am | by Reuters | News | Comments

Chinese state media has branded Apple Inc's iPhone a threat to national security because of the smartphone's ability to track and time-stamp user locations.                           

The Hazards Of Probing The Internet's Dark Side

July 11, 2014 10:49 am | by Editor | Blogs | Comments

Late last year, hackers breached Target's data security and stole information from millions of credit cards. Brian Krebs, who writes about cyber crime and computer security for his blog, Krebs on Security, broke the story. A few days later, he broke the story of a credit card breach at Neiman Marcus.

US and UK Consumers Avoid Pirated Content

July 11, 2014 9:55 am | by Infosecurity | News | Comments

Illegally obtaining TV and movies is almost endemic in the Asia-Pacific region though.                                               

Female Cybersleuths Hacking Into Security Tech

July 7, 2014 10:16 am | News | Comments

Tiffany Rad is turning the gender stereotypes in the software industry on their head. Rad is a “white hat,” a hacker who specializes in looking for security holes so they can be fixed. The attorney turned her computer hacking hobby into a career in 2008, when she submitted a research proposal to an underground security conference in New York.

US to Ask China to Restart Cyber Working Group

July 1, 2014 12:20 pm | by Matthew Pennington, Associated Press | News | Comments

The United States wants to restart a cybersecurity working group that China shut down after the U.S. indicted five Chinese military officers on charges of hacking into American companies' computers to steal trade secrets.        

Advertisement
Embedded systems — small computer systems built around microcontrollers — are becoming more common. But they remain vulnerable to security breaches.

Making the Internet of Things Safer

June 26, 2014 12:16 pm | by UC San Diego | News | Comments

As a result of the advance of the so-called Internet of Things, where all devices are connected and communicate with one another, embedded systems — small computer systems built around microcontrollers — are becoming more common. But they remain vulnerable to security breaches.

InfoSec teams should expand their rapid incident detection and response capabilities to mobile devices that have access to sensitive data.

Mobile Security Needs Incident Readiness

June 24, 2014 11:47 am | by AccessData | News | Comments

AccessData and Gigaom Research have released a report on the growing complexities of mobile security and the limitations of “preventive, policy-driven” solutions that are not designed to detect and respond to mobile security incidents that bypass defenses.

Newly Observed Domains (NOD), a new set of data solutions that provide real-time actionable insights on young domain names.

Farsight Security Launches at the FIRST Conference in Boston

June 24, 2014 11:17 am | by Farsight Security, Inc. | News | Comments

Farsight Security, Inc., has emerged from stealth mode at the FIRST Conference in Boston, Massachusetts to debut Newly Observed Domains (NOD), a new set of data solutions that provide real-time actionable insights on young domain names.   

Cybersecurity Center Earns DHS, NSA Designation

June 23, 2014 9:04 am | News | Comments

Kansas State University's cybersecurity center is receiving national recognition for its dedication to cutting-edge research. The university's Center for Information and Systems Assurance has been redesignated as a National Center of Academic Excellence in Information Assurance/Cyber Defense Research. The designation is from the U.S. Department of Homeland Security and the National Security Agency and is effective from 2014 to 2019.

The nationwide shortage of cybersecurity professionals — particularly for positions within the federal government — creates risks for national and homeland security, according to a new study from the RAND Corporation.

Shortage of Cybersecurity Professionals Poses Risk to National Security

June 19, 2014 8:13 am | by Rand Corporation | News | Comments

The nationwide shortage of cybersecurity professionals — particularly for positions within the federal government — creates risks for national and homeland security, according to a new study from the RAND Corporation.         

Advertisement
University of New Haven students will join the national effort to combat cybercrime now that the university has become one of just 13 colleges nationwide, and the first in Connecticut, to form a partnership with the Defense Cyber Crime Center (DC3)

UNH Cyber Forensics Unit Partners with the DC3

June 17, 2014 2:55 pm | by Univ. of New Haven | News | Comments

University of New Haven students will join the national effort to combat cybercrime now that the university has become one of just 13 colleges nationwide, and the first in Connecticut, to form a partnership with the Defense Cyber Crime Center (DC3).

Pittsburgh has become the arsenal of cybersecurity

Pittsburgh Cyber Squad Leads Way in Cybercrime Fight

June 17, 2014 1:39 pm | by Rich Lord and Albert Anderson, Pittsburgh Post-Gazette | News | Comments

Pittsburgh has become the arsenal of cybersecurity. It is home to CMU’s Software Engineering Institute with its 260-person CERT cyber team, and the FBI has placed a nonprofit training alliance here, assigning a data warrior to its helm.    

The UK’s National Crime Agency has claimed that PC users have until midnight local time on Tuesday to clean their machines and improve defences against notorious malware GameoverZeus and CryptoLocker.

Midnight Deadline Approaches for GOZeus and CryptoLocker Victims

June 17, 2014 9:55 am | by Infosecurity | News | Comments

The UK’s National Crime Agency has claimed that PC users have until midnight local time on Tuesday to clean their machines and improve defences against notorious malware GameoverZeus and CryptoLocker.              

Ars Technica Tests Internet Surveillance

June 12, 2014 8:47 am | by Sean Gallagher, Ars Technica | News | Comments

Ars Technica's Sean Gallagher partnered with NPR tech correspondent Steve Henn for an experiment in Internet surveillance. For one week, while Henn researched a story, he allowed himself to be watched — acting as a stand-in, in effect, for everyone who uses Internet-connected devices. How much of our lives do we really reveal simply by going online?

Internet Giants Erect Barriers to Spy Agencies

June 10, 2014 11:25 am | by David Sanger and Nicole Perlroth, The New York Times | News | Comments

After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers.

The Human Side of Heartbleed

June 5, 2014 8:59 am | by Editor | Blogs | Comments

The announcement on April 7 was alarming. A new Internet vulnerability called Heartbleed could allow hackers to steal your logins and passwords. It affected a piece of security software that is used on half a million websites worldwide. Fixing it would be hard: It would strain our security infrastructure and the patience of users everywhere.

DARPA's Cyber Grand Challenge Offers $3.75M in Prizes

June 4, 2014 11:16 am | by Help Net Security | News | Comments

Computer security experts from academia, industry and the larger security community have organized themselves into more than 30 teams to compete in DARPA's Cyber Grand Challenge, a tournament designed to speed the development of automated security systems able to defend against cyber attacks as fast as they are launched.

The Sixth Estate of Cyberspace: The Hacker Supply Chain

June 2, 2014 9:23 am | by Tom Kellermann | Blogs | Comments

On June 5, the Cyber Security Summit will take place in Tysons Corner, Virginia; this is a unique high-level forum between the private sector, cybersecurity leadership and the U.S. government.                 

US Cybercrime Laws Used to Target Security Researchers

May 30, 2014 10:21 am | by Tom Brewster, the Guardian | News | Comments

Some of the world’s best-known security researchers claim to have been threatened with indictment over their efforts to find vulnerabilities in internet infrastructure, amid fears American computer hacking laws are perversely making the web less safe to surf.

US Companies Seek Cyber Experts for Top Jobs, Board Seats

May 30, 2014 9:52 am | by Nadia Damouni, Reuters | News | Comments

Some of the largest U.S. companies are looking to hire cybersecurity experts in newly elevated positions and bring technologists on to their boards, a sign that corporate America is increasingly worried about hacking threats.       

How Hackers Steal Company Secrets

May 22, 2014 2:40 pm | by MWR InfoSecurity | News | Comments

Recent research carried out by global information security firm MWR InfoSecurity, supported by CPNI (Centre for the Protection of National Infrastructure), has revealed current and new techniques being used by cyber criminals to steal sensitive information from companies.

Cyber Warriors Flex Digital Muscle at 2014 Cyber Shield Exercise

May 22, 2014 8:25 am | by Staff Sgt. Kelvin Green and Capt. Kyle Key, DVIDS | News | Comments

With cyber attacks occurring more frequently and becoming more complex, the National Guard is stepping up its efforts to defend critical infrastructure networks and develop the next generation of Cyber Warriors.           

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading