Advertisement
Topics
Subscribe to Topics

The Lead

Within four days of the first public reports of a major flaw in OpenSSL's software for securing communications on the Internet, mass attacks searched for and targeted vulnerable servers. In a report, IBM found that while the attacks have died down, approx

Heartbleed Risk Continues as Servers Remain Unpatched

August 28, 2014 4:51 pm | by Robert Lemos, Ars Technica | News | Comments

Within four days of the first public reports of a major flaw in OpenSSL's software for securing communications on the Internet, mass attacks searched for and targeted vulnerable servers. In a report, IBM found that while the attacks have died down, approximately half of the original 500,000 potentially vulnerable servers remain unpatched.

Mobile Forensics is Changing Offender Profiling

August 28, 2014 4:39 pm | by Yuval Ben-Moshe, Forensic Focus | News | Comments

Mobile forensics has changed the methodology when it comes to offender profiling.  The...

Agency Incident Response Rate

August 28, 2014 4:21 pm | by William Jackson, GCN | News | Comments

As in any job, in cybersecurity it’s the paperwork that gets you. In a recent study, the...

Massive Cyber Attack on Oil and Energy Industry in Norway

August 28, 2014 4:12 pm | by Lee Munson | Blogs | Comments

As many as 300 oil and energy companies have been targeted by hackers in the largest ever...

View Sample

SUBSCRIBE TO FREE DFI News EMAIL NEWSLETTER

In the context of cyber crime, emerging countries such as Brazil, South Korea and Turkey among many others are in the crosshairs because of a number of factors, including a prevalence of outdated and unpatched computers and lower levels of security awaren

Windows XP-heavy Turkey Overrun with GoZ Infections

August 28, 2014 4:04 pm | by Michael Mimoso | Blogs | Comments

In the context of cyber crime, emerging countries such as Brazil, South Korea and Turkey among many others are in the crosshairs because of a number of factors, including a prevalence of outdated and unpatched computers and lower levels of security awareness within the general population.

At no time in history has there been a greater need to hire security professionals to protect and defend infrastructures from an inexhaustible onslaught of organized crime, industrial espionage, and nation-state attacks.

Cybersecurity Hiring Crisis: Rockstars, Anger and the Billion Dollar Problem

August 28, 2014 11:12 am | by Violet Blue | Blogs | Comments

At no time in history has there been a greater need to hire security professionals to protect and defend infrastructures from an inexhaustible onslaught of organized crime, industrial espionage, and nation-state attacks.         

Much has been made of the aging infrastructure and outdated software tools that are used to protect the power grid in the US from cybe attack, but a new era of code-breaking quantum computers threatens to give criminals futuretech that rivals any sci-fi m

DoE Sinks $3M into Quantum Encryption

August 28, 2014 11:01 am | by Tara Seals, Infosecurity Magazine | News | Comments

Much has been made of the aging infrastructure and outdated software tools that are used to protect the power grid in the US from cybe attack, but a new era of code-breaking quantum computers threatens to give criminals future tech that rivals any sci-fi movie plot. 

Advertisement
In a restricted intelligence document distributed to police, public safety, and security organizations in July, the Department of Homeland Security warned of a “malicious activity” that could expose secrets and security vulnerabilities in organizations’ i

Feds Warn First Responders of Google Search Hacking Tool

August 28, 2014 10:53 am | by Sean Gallagher, Ars Technica | News | Comments

In a restricted intelligence document distributed to police, public safety, and security organizations in July, the Department of Homeland Security warned of a “malicious activity” that could expose secrets and security vulnerabilities in organizations’ information systems. The name of that activity: “Google dorking.”

Digital devices have provided law enforcement agencies investigating child abuse and exploitation with an embarrassment of riches. The devices can hold thousands of images that can be used as evidence and as clues to help identify and find missing childre

Improved Image Analysis Tools Speed Exploited Children Cases

August 28, 2014 10:29 am | by William Jackson, GCN | News | Comments

Digital devices have provided law enforcement agencies investigating child abuse and exploitation with an embarrassment of riches. The devices can hold thousands of images that can be used as evidence and as clues to help identify and find missing children. But the sheer volume of data being reviewed can slow an investigation to a crawl.

Backoff, Dairy Queen, UPS & Retail's Growing PoS Security Problem

August 28, 2014 10:11 am | by Sara Peters | Blogs | Comments

Retail security is under the microscope this week, thanks to data breaches at United Parcel Service franchises (and possibly Dairy Queen franchises), government warnings about the Backoff point-of-sale malware, and new research that shows persistent vulnerabilities in retail applications.

JPMorgan Chase & Co is investigating a possible cyber attack and working with law enforcement authorities to determine the scope. It disclosed the investigation after the FBI said Wednesday evening it was investigating media reports earlier in the day tha

JPMorgan Probes Possible Cyber Attack

August 28, 2014 9:40 am | by Reuters | News | Comments

JPMorgan Chase & Co is investigating a possible cyber attack and working with law enforcement authorities to determine the scope. It disclosed the investigation after the FBI said Wednesday evening it was investigating media reports earlier in the day that several U.S. financial companies have been victims of recent cyber attacks.

As the acting cybersecurity chief of a federal agency, Timothy DeFoggi should have been well versed in the digital footprints users leave behind online when they visit web sites and download images. But he must have believed his use of the Tor anonymizing

Federal Cybersecurity Director Found Guilty on Child Porn Charges

August 27, 2014 11:28 am | by Kim Zetter, Wired | News | Comments

As the acting cybersecurity chief of a federal agency, Timothy DeFoggi should have been well versed in the digital footprints users leave behind online when they visit web sites and download images. But he must have believed his use of the Tor anonymizing network shielded him from federal investigators.

Advertisement
Services are up and running again after a denial of service took down Sony's PlayStation Network for much of Sunday, coinciding with a bomb threat on American Airlines flight 362, which carried John Smedley, president of Sony Online Entertainment. The thr

Sony, XBox Victims of DDoS, Hacktivist Threats

August 27, 2014 11:11 am | by Sara Peters | Blogs | Comments

Services are up and running again after a denial of service took down Sony's PlayStation Network for much of Sunday, coinciding with a bomb threat on American Airlines flight 362, which carried John Smedley, president of Sony Online Entertainment. The threats caused the airline to divert the flight.

Black Hat USA 2014 recently welcomed more than 9,000 of the most renowned security experts. Tucked away from the glamour of the vendor booths giving away t-shirts and the large presentation rooms filled with rockstar sessions, was the Arsenal — a place wh

Synergy of Hackers and Tools at the Black Hat Arsenal

August 27, 2014 10:50 am | by Mirko Zorz, Help Net Security | News | Comments

Black Hat USA 2014 recently welcomed more than 9,000 of the most renowned security experts. Tucked away from the glamour of the vendor booths giving away t-shirts and the large presentation rooms filled with rockstar sessions, was the Arsenal — a place where developers were able to present their security tools and grow their community.

Alleged Silk Road mastermind Ross Ulbricht (aka, Dread Pirate Roberts), has been indicted on three additional charges, including narcotics trafficking, distribution of narcotics by means of the internet, and conspiracy to traffic in fraudulent identificat

Silk Road Kingpin Faces Yet More Criminal Charges

August 27, 2014 10:28 am | by Tara Seals, Infosecurity Magazine | News | Comments

Alleged Silk Road mastermind Ross Ulbricht (aka, Dread Pirate Roberts), has been indicted on three additional charges, including narcotics trafficking, distribution of narcotics by means of the internet, and conspiracy to traffic in fraudulent identification documents.

South Korean authorities have revealed a massive data breach that has affected well over half of the country's 50 million citizens.

220 Million Records Stolen, 16 Arrested in Massive South Korean Data Breach

August 27, 2014 10:19 am | by Lee Munson | Blogs | Comments

South Korean authorities have revealed a massive data breach that has affected well over half of the country's 50 million citizens.                                 

According to newly published documents, the National Security Agency has built a “Google-like” search interface for its vast database of metadata, and the agency shares it with dozens of other American intelligence agencies. The new documents are part of

NSA Increases Interagency Cooperation with Own Search Engine

August 26, 2014 11:00 am | by Cyrus Farivar. Ars Technica | News | Comments

According to newly published documents, the National Security Agency has built a “Google-like” search interface for its vast database of metadata, and the agency shares it with dozens of other American intelligence agencies. The new documents are part of the Snowden leaks and were first published on by The Intercept.

Advertisement
Governor Jerry Brown of California on Monday signed into law a measure that requires smartphones sold in California to include smarter antitheft technology, a feature that lawmakers hope will help reduce phone theft.

California Governor Signs Law Requiring 'Kill Switch' on Smartphones

August 26, 2014 10:19 am | by Brian Chen | Blogs | Comments

Governor Jerry Brown of California on Monday signed into law a measure that requires smartphones sold in California to include smarter antitheft technology, a feature that lawmakers hope will help reduce phone theft.         

Websense Security Labs has come across an interesting campaign, targeting Russian nationals, trying to lure them to download and run executables on their computers, under the guise of attacking Western government websites.

Kelihos Botnet Trying to Expand by Harnessing Russian National Sentiments

August 26, 2014 10:11 am | by Editor | Blogs | Comments

Websense Security Labs has come across an interesting campaign, targeting Russian nationals, trying to lure them to download and run executables on their computers, under the guise of attacking Western government websites.       

Even before the academic semester starts, students from across the globe have begun registering for the largest set of student cybersecurity competitions in the world: the NYU Polytechnic School of Engineering Cyber Security Awareness Week (CSAW).

NYU Launches Largest Cybersecurity Student Contests

August 26, 2014 10:04 am | by NYU Polytechnic School of Engineering | News | Comments

Even before the academic semester starts, students from across the globe have begun registering for the largest set of student cybersecurity competitions in the world: the NYU Polytechnic School of Engineering Cyber Security Awareness Week (CSAW).

Six months ago, NIST released version 1.0 of its voluntary Framework for Improving Critical Infrastructure Cybersecurity. The framework was developed with industry in a collaborative and open process over the course of a year, as directed by President Oba

NIST Seeks Info on User Experiences with Cybersecurity Framework

August 26, 2014 9:54 am | by NIST | News | Comments

Six months ago, NIST released version 1.0 of its voluntary Framework for Improving Critical Infrastructure Cybersecurity. The framework was developed with industry in a collaborative and open process over the course of a year, as directed by President Obama in Executive Order 13636. NIST is now seeking public feedback on the framework.

Ciphertex Data Security has introducted the CX-4K-NAS, a high performing, portable, reliable and encrypted NAS server with up to 32TB of storage capacity and four bays.

Portable NAS Server

August 26, 2014 8:59 am | Ciphertex Data Security | Product Releases | Comments

Ciphertex Data Security has introducted the CX-4K-NAS, a high performing, portable, reliable and encrypted NAS server with up to 32TB of storage capacity and four bays.

To help digital forensic and incident response (DFIR) professionals take on any Apple case without hesitation, the SANS Institute has introduced the new FOR518: Mac Forensic Analysis course. This intense hands-on forensic analysis course will help Windows

SANS Introduces Apple, Mac and iDevice, Forensic Analysis Course

August 26, 2014 7:56 am | SANS Institute | News | Comments

To help digital forensic and incident response (DFIR) professionals take on any Apple case without hesitation, the SANS Institute has introduced the new FOR518: Mac Forensic Analysis course. This intense hands-on forensic analysis course will help Windows-based investigators broaden their analysis capabilities and achieve the confidence and knowledge needed to comfortably analyze any Mac or iOS system without hesitation. 

A cyber attack at a firm that performs background checks for U.S. government employees compromised data of at least 25,000 workers, including some undercover investigators, and that number could rise, agency officials say.

US Undercover Investigators among Those Exposed in Data Breach

August 25, 2014 11:20 am | by Jim Finkle and Mark Hosenball, Reuters | News | Comments

A cyber attack at a firm that performs background checks for U.S. government employees compromised data of at least 25,000 workers, including some undercover investigators, and that number could rise, agency officials say.       

There is a severe shortage of information security professionals, and leading industry experts say it's only getting worse. Word among attendees at Black Hat USA 2014 conference was that there are more jobs in cybersecurity than people to fill them.

Cybersecurity's Hiring Crisis: A Troubling Trajectory

August 25, 2014 11:05 am | by Violet Blue | Blogs | Comments

There is a severe shortage of information security professionals, and leading industry experts say it's only getting worse. Word among attendees at Black Hat USA 2014 conference was that there are more jobs in cybersecurity than people to fill them.

I’ve seen some email threads on a few listserv groups talking about developing a capability to take indicators from threat feeds and automatically generating signatures that can be used in various detection technologies. I have some issues with taking thi

Feeds, Feeds and More Feeds

August 25, 2014 10:37 am | by Editor | Blogs | Comments

I’ve seen some email threads on a few listserv groups talking about developing a capability to take indicators from threat feeds and automatically generating signatures that can be used in various detection technologies. I have some issues with taking this approach and thought a blog post on it may be better than replying to these threads.

The video of James Foley’s execution may have been staged, with the actual   murder taking place off-camera, it has emerged. Forensic analysis of the   footage of the journalist’s death has suggested that the British jihadist in   the film may have been t

Foley Murder Video 'May Have been Staged'

August 25, 2014 10:29 am | by Bill Gardner, The Telegraph | News | Comments

The video of James Foley’s execution may have been staged, with the actual murder taking place off-camera, it has emerged. Forensic analysis of the footage of the journalist’s death has suggested that the British jihadist in the film may have been the frontman rather than the killer.

A team of researchers have identified a weakness believed to exist in Android, Windows and iOS mobile operating systems that could be used to obtain personal information from unsuspecting users. They demonstrated the hack in an Android phone.

Mobile OS Weakness Allows Apps to Steal Personal Information

August 25, 2014 9:47 am | by Sean Nealon, Univ. of California - Riverside | News | Comments

A team of researchers have identified a weakness believed to exist in Android, Windows and iOS mobile operating systems that could be used to obtain personal information from unsuspecting users. They demonstrated the hack in an Android phone.  

Basis Technology has released Autopsy 3.1, the latest version of its flagship open source digital forensics platform. Autopsy is a free and open source Windows-based digital forensics platform that has been built to provide an intuitive workflow for users

Autopsy 3.1

August 25, 2014 8:35 am | Basis Technology | Product Releases | Comments

Basis Technology has released Autopsy 3.1, the latest version of its flagship open source digital forensics platform. Autopsy is a free and open source Windows-based digital forensics platform that has been built to provide an intuitive workflow for users in the law enforcement, intelligence, cybersecurity and incident response communities.  

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading