Advertisement
Topics
Subscribe to Topics

The Lead

A month after rebranding from Telecom to Spark, the leading New Zealand ISP had received collateral damage from the conflict between Russia and Ukraine. Fights there have never really been toe-to-toe, but, on Friday evening, September 5, Spark engineers a

Spark DNS Bounces DDoS Attack

November 21, 2014 4:58 pm | by Debbie Fletcher | Articles | Comments

A month after rebranding from Telecom to Spark, the leading New Zealand ISP had received collateral damage from the conflict between Russia and Ukraine. Fights there have never really been toe-to-toe, but, on Friday evening, September 5, Spark engineers announced that a layer-3 DDoS attack was causing an overload of its DNS servers.

Using Company Devices for Personal Activities Leads to Data Loss

November 21, 2014 11:55 am | News | Comments

GFI Software released the findings of an independent study into how workers use company...

Russians Spy on UK Baby Monitor, CCTV and Webcam Feeds

November 21, 2014 11:28 am | by Tara Seals, Infosecurity Magazine | News | Comments

It’s not a newsflash that laptops’ webcams can be hacked, allowing remote eyes to peer out at...

NSA Director Warns China Can Damage US Infrastructure

November 21, 2014 11:10 am | by Ken Dilanian, Associated Press | News | Comments

China and "one or two" other countries are capable of mounting cyber attacks that would...

View Sample

SUBSCRIBE TO FREE DFI News EMAIL NEWSLETTER

On November 10, a 12-year-old girl left her home in the Baltimore suburb of Nottingham at 7:30am, heading to her middle school. She never returned home. Her digital identities played a role in the forensics work used to track down her abductor. But they a

12-year-old's Online Life Leads to Abduction

November 21, 2014 11:00 am | by Sean Gallagher, Ars Technica | News | Comments

On November 10, a 12-year-old girl left her home in the Baltimore suburb of Nottingham at 7:30am, heading to her middle school. She never returned home. Her digital identities played a role in the forensics work used to track down her abductor. But they also played a major role in her abduction.

A study of published intelligence on three major malware families used in Russia's cyberespionage operations shows a highly coordinated, targeted, and stealthy strategy.

Russian Cyber Espionage Under the Microscope

November 21, 2014 10:19 am | by Kelly Jackson Higgins | Blogs | Comments

A study of published intelligence on three major malware families used in Russia's cyberespionage operations shows a highly coordinated, targeted, and stealthy strategy.                       

When compared to a typical hard drive, SSDs are totally different in design and functionality which leads to some difficult issues to deal with pertaining to their forensic analysis.

Solid State/Hard Drive Differences

November 21, 2014 9:16 am | Articles | Comments

When compared to a typical hard drive, SSDs are totally different in design and functionality which leads to some difficult issues to deal with pertaining to their forensic analysis.                   

Advertisement
 Dissenters within the National Security Agency, led by a senior agency executive, warned in 2009 that the program to secretly collect American phone records wasn't providing enough intelligence to justify the backlash it would cause if revealed, current

Some in NSA Warned of Backlash

November 20, 2014 1:57 pm | by Ken Dilanian, Associated Press | News | Comments

Dissenters within the National Security Agency, led by a senior agency executive, warned in 2009 that the program to secretly collect American phone records wasn't providing enough intelligence to justify the backlash it would cause if revealed, current and former intelligence officials say.

In the next few months hackers will try to penetrate the cyber defenses of Britain's major banks and steal information about millions of customers. But for once they'll be welcome.

Hackers to Probe Cybercrime Defenses at British Banks

November 20, 2014 1:48 pm | by Steve Slater and Matt Schuffham, Reuters | News | Comments

In the next few months hackers will try to penetrate the cyber defenses of Britain's major banks and steal information about millions of customers. But for once they'll be welcome.                   

Encrypted communications is very en vogue post-Snowden, but there can be unintended consequences. The growing use of encryption to address privacy concerns is creating perfect conditions for cyber criminals to hide malware inside encrypted transactions, a

Malware Authors Making a Payday Off Encryption

November 20, 2014 12:33 pm | by Tara Seals, Infosecurity Magazine | News | Comments

Encrypted communications is very en vogue post-Snowden, but there can be unintended consequences. The growing use of encryption to address privacy concerns is creating perfect conditions for cyber criminals to hide malware inside encrypted transactions, and even reducing the level of sophistication required for malware to avoid detection.

It’s by no means complete yet, but the transition to a mobile IT environment in government is well established. Parallel with that, however, is the expectation that mobile communications will be able to deliver all that society expects in the way of seaml

5G Will Power Network of the Future

November 20, 2014 12:28 pm | by Brian Robinson, GCN | News | Comments

It’s by no means complete yet, but the transition to a mobile IT environment in government is well established. Parallel with that, however, is the expectation that mobile communications will be able to deliver all that society expects in the way of seamless audio, video streaming and fast transfer of multi-megabyte data files.  

Mobile security firm Lookout has discovered a more sophisticated variant of the NotCompatible Android botnet which it says targets enterprise networks through compromised mobile devices.

Botnet Infects Android, Infiltrates Corporate Networks

November 20, 2014 12:17 pm | by Doug Drinkwater, SC Magazine | News | Comments

Mobile security firm Lookout has discovered a more sophisticated variant of the NotCompatible Android botnet which it says targets enterprise networks through compromised mobile devices.                  

Advertisement
Leading prosecutors in New York and London police plan to embed staff in each others’ offices, officials say, increasing transatlantic collaboration in an effort to combat cybercrime.

London Police and NYC Prosecutors to Swap Staff in Cybercrime Fight

November 20, 2014 12:08 pm | by Sam Frizell, Time | News | Comments

Leading prosecutors in New York and London police plan to embed staff in each others’ offices, officials say, increasing transatlantic collaboration in an effort to combat cyber crime.                   

We live in a world today where individuals’ movements and locations are being recorded in many different ways. These movements and locations are commonly being used as evidence in civil, criminal and domestic litigation. It is of paramount importance that

Cell Phone Tracking via Call Detail Records

November 19, 2014 10:34 am | by Larry E. Daniel | Blogs | Comments

We live in a world today where individuals’ movements and locations are being recorded in many different ways. These movements and locations are commonly being used as evidence in civil, criminal and domestic litigation. It is of paramount importance that anyone who is involved in litigation that uses cellular location evidence understands the appropriate and inappropriate use of this type of location data.

Leading Democrats in both houses of Congress sent letters to 16 major banks and other financial firms requesting detailed information about recent data breaches and briefings from corporate data security officials.

House, Senate Democrats Seek Details on Data Breaches

November 19, 2014 9:57 am | by Reuters | News | Comments

Leading Democrats in both houses of Congress sent letters to 16 major banks and other financial firms requesting detailed information about recent data breaches and briefings from corporate data security officials.          

Attackers will continue to resort to non-amplification attacks when there are not enough vulnerable systems available to exploit for reflection methods.There will be a rise in mobile DDoS attacks as emerging countries increase smartphone subscriber usage.

DDoS Attacks Shrinking, Switching to Mobile

November 19, 2014 9:34 am | by Black Lotus | News | Comments

Attackers will continue to resort to non-amplification attacks when there are not enough vulnerable systems available to exploit for reflection methods.There will be a rise in mobile DDoS attacks as emerging countries increase smartphone subscriber usage.

The Senate on Tuesday blocked a bill to end bulk collection of Americans' phone records by the National Security Agency. The legislation would have ended the NSA's collection of domestic calling records, instead requiring the agency to obtain a court orde

Senate Blocks Shutdown of NSA Phone Records Collection

November 19, 2014 9:06 am | by Ken Dilanian, Associated Press | News | Comments

The Senate on Tuesday blocked a bill to end bulk collection of Americans' phone records by the National Security Agency. The legislation would have ended the NSA's collection of domestic calling records, instead requiring the agency to obtain a court order each time it wanted to analyze the records in terrorism cases, and query records held by the telephone companies.

Advertisement
MIT has received $15 million in funding from the William and Flora Hewlett Foundation to establish an initiative aimed at laying the foundations for a smart, sustainable cybersecurity policy to deal with the growing cyber threats faced by governments, bus

Foundation Funds New Initiative on Cybersecurity Policy

November 19, 2014 8:41 am | by MIT | News | Comments

MIT has received $15 million in funding from the William and Flora Hewlett Foundation to establish an initiative aimed at laying the foundations for a smart, sustainable cybersecurity policy to deal with the growing cyber threats faced by governments, businesses, and individuals.

Current research in the area of digital image forensics is developing better ways to convert image files into frequencies, such as using wavelet transforms in addition to more traditional cosine transforms and more sensitive methods for determining if eac

Leading the Eyewitness: Digital Image Forensics in a Megapixel World

November 19, 2014 8:25 am | by William Weaver, Ph.D. | Articles | Comments

Current research in the area of digital image forensics is developing better ways to convert image files into frequencies, such as using wavelet transforms in addition to more traditional cosine transforms and more sensitive methods for determining if each area of an image belongs to the whole.

The immensely popular Whatsapp instant messenger has the potential to become an even more attractive option for users, as the company has partnered with Open Whisper Systems to implement the latter's TextSecure protocol into their clients.

Open Whisper Systems Helps WhatsApp Achieve End-to-end Encryption

November 18, 2014 12:22 pm | by Zeljka Zorz, Help Net Security | News | Comments

The immensely popular Whatsapp instant messenger has the potential to become an even more attractive option for users, as the company has partnered with Open Whisper Systems to implement the latter's TextSecure protocol into their clients.   

ISIS members have proven exceptionally difficult to track due a proper use of technology tools, like application for encryption, social media platforms and encrypted instant messaging platforms. Recently the media announced that ISIS has released a manual

ISIS Keeps Getting Better at Avoiding US Surveillance

November 18, 2014 12:14 pm | by Pierluigi Paganini | Blogs | Comments

ISIS members have proven exceptionally difficult to track due a proper use of technology tools, like application for encryption, social media platforms and encrypted instant messaging platforms. Recently the media announced that ISIS has released a manual for its militants, titled “How to Tweet Safely Without Giving out Your Location to NSA," that explain how avoid surveillance.

A large number of the Tor-anonymized domains recently seized in a crackdown on illegal darknet services were clones or imposter sites, according to an analysis published Monday.

Many Tor Domains Seized by Police are Imposters

November 18, 2014 11:58 am | by Dan Goodin, Ars Technica | News | Comments

A large number of the Tor-anonymized domains recently seized in a crackdown on illegal darknet services were clones or imposter sites, according to an analysis published Monday.                     

In its statement on Monday night, Anonymous explained that through the Klan's Twitter account, it obtained large amounts of information on multiple white supremacists, and "members of Anonymous who seized the account are continuing to debate if the identi

Anonymous Statement: KKK is a Terrorist Group, KKK Responds Poorly

November 18, 2014 11:48 am | by Violet Blue | Blogs | Comments

In its statement on Monday night, Anonymous explained that through the Klan's Twitter account, it obtained large amounts of information on multiple white supremacists, and "members of Anonymous who seized the account are continuing to debate if the identities of the people associated with the Klan's account should be released to the public."

Just a few weeks after its existence was revealed, Beijing police have arrested three people who are allegedly the authors of the WireLurker malware that targets Macs and iPhones.

WireLurker Suspects Arrested in Beijing

November 18, 2014 10:12 am | by Tara Seals, Infosecurity Magazine | News | Comments

Just a few weeks after its existence was revealed, Beijing police have arrested three people who are allegedly the authors of the WireLurker malware that targets Macs and iPhones.                    

Time is not your friend when your information systems are under cyber attack, but sharing threat information before, during, and after an attack with a trusted group of peers can help. NIST has prepared a Guide to Cyber Threat Information Sharing that pro

NIST Wants to Help You Share

November 18, 2014 10:01 am | by NIST | News | Comments

Time is not your friend when your information systems are under cyber attack, but sharing threat information before, during, and after an attack with a trusted group of peers can help. NIST has prepared a Guide to Cyber Threat Information Sharing that provides organizations with the key practices they need to consider when planning, implementing and maintaining information sharing relationships.

For years the government has refused to talk about or even acknowledge its secret use of zero-day software vulnerabilities to hack into the computers of adversaries and criminal suspects. This year, however, the Obama administration finally acknowledged t

US Gov Insists It Doesn't Stockpile Zero-day Exploits

November 17, 2014 12:16 pm | by Kim Zetter, Wired | News | Comments

For years the government has refused to talk about or even acknowledge its secret use of zero-day software vulnerabilities to hack into the computers of adversaries and criminal suspects. This year, however, the Obama administration finally acknowledged that the NSA and law enforcement agencies sometimes keep information about software vulnerabilities secret so the government can exploit them for purposes of surveillance and sabotage.

With the recent streak of widely publicized breaches of well-known companies, many organizations are examining their incident response (IR) capabilities. SANS conducted a survey earlier this year to explore what IR teams are up against – what types of att

2014 SANS Incident Response Survey Results

November 17, 2014 11:35 am | by Garrett Gross | Blogs | Comments

With the recent streak of widely publicized breaches of well-known companies, many organizations are examining their incident response (IR) capabilities. SANS conducted a survey earlier this year to explore what IR teams are up against — what types of attacks are most common, what defenses are most widely used, and what challenges IR teams face in their response efforts. 

Over half of senior IT and HR professionals would consider hiring former hackers in a bid to overcome crippling cybersecurity skills gaps and shortages, according to new research from consultancy KPMG.

Firms Would Hire Ex-cons as Cybersecurity Pros

November 17, 2014 11:28 am | by Phil Muncaster, Infosecurity Magazine | News | Comments

Over half of senior IT and HR professionals would consider hiring former hackers in a bid to overcome crippling cybersecurity skills gaps and shortages, according to new research from consultancy KPMG.             

The State Department has taken the unprecedented step of shutting down its entire unclassified email system as technicians repair possible damage from a suspected hacker attack.

State Dept Hacked, Email Shut Down

November 17, 2014 10:57 am | by Matthew Lee, Associated Press | News | Comments

The State Department has taken the unprecedented step of shutting down its entire unclassified email system as technicians repair possible damage from a suspected hacker attack. A senior department official said Sunday that "activity of concern" was detected in the system around the same time as a previously reported incident that targeted the White House computer network. 

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading