Advertisement
Topics
Subscribe to Topics

The Lead

A Danish court has sentenced the Swedish founder of file-sharing site The Pirate Bay to 3½ years in prison after he was found guilty of hacking into a private company handling sensitive information for Danish authorities.

Pirate Bay Founder Sentenced for Hacking Danish Data

October 31, 2014 10:45 am | by Associated Press | News | Comments

A Danish court has sentenced the Swedish founder of file-sharing site The Pirate Bay to 3½ years in prison after he was found guilty of hacking into a private company handling sensitive information for Danish authorities.        

Cybersecurity Not Just about Hackers

October 31, 2014 10:22 am | by Maria Zacharias, The National Science Foundation | News | Comments

Students supported through California State University, San Bernardino's SFS program are being...

Chip & PIN vs Chip & Signature

October 31, 2014 9:44 am | by Editor | Blogs | Comments

The Obama administration recently issued an executive order requiring that federal agencies...

How Bots and Zombies Work, and Why You Should Care

October 31, 2014 9:30 am | by Paul Ducklin | Blogs | Comments

We regularly write about "bots," or "zombies," malicious programs that let cyber criminals take...

View Sample

SUBSCRIBE TO FREE DFI News EMAIL NEWSLETTER

Boot loaders are currently considered the most forensically sound physical extraction method. While they do involve loading a piece of code onto the device, this happens before the forensic tool accesses any evidentiary data. That’s because they replace t

Accurate Data, Forensic Soundness

October 31, 2014 8:23 am | by Ronen Engler and Christa M. Miller | Cellebrite USA, Inc. | Articles | Comments

Boot loaders are currently considered the most forensically sound physical extraction method. While they do involve loading a piece of code onto the device, this happens before the forensic tool accesses any evidentiary data. That’s because they replace the device’s normal boot loader, or the first set of operations that kick off the phone’s startup process and hand off to the main controlling program, like the operating system.

An attack by hackers on a White House computer network earlier this month was considered so sensitive that only a small group of senior congressional leaders were initially notified about it, U.S. officials say.

Only Top Legislators Informed of White House Cyber Breach

October 30, 2014 4:39 pm | by Mark Hosenball, Reuters | News | Comments

An attack by hackers on a White House computer network earlier this month was considered so sensitive that only a small group of senior congressional leaders were initially notified about it, U.S. officials say.           

IBM has developed new high-speed analysis and criminal investigation software that is designed to uncover hidden criminal threats buried deep inside massive volumes of disparate corporate data.

IBM Big Data Uncovers Criminal Cyber Activity

October 30, 2014 4:27 pm | by IBM | News | Comments

IBM has developed new high-speed analysis and criminal investigation software that is designed to uncover hidden criminal threats buried deep inside massive volumes of disparate corporate data.                

Advertisement
 CurrentC, a merchant-backed mobile payment system in development to rival   Google Wallet and Apple Pay, has been hacked during its pilot phase.

Apple Pay Rival CurrentC Hacked

October 30, 2014 11:24 am | by Charlie Osborne | Blogs | Comments

CurrentC, a merchant-backed mobile payment system in development to rival Google Wallet and Apple Pay, has been hacked during its pilot phase.                               

Most organizations are facing rising threats in their information security risk environment, but over a third have no real-time insight on cyber risks necessary to combat these threats.

Organizations Still Unprepared for Cyber Attacks

October 30, 2014 11:14 am | by EY | News | Comments

Most organizations are facing rising threats in their information security risk environment, but over a third have no real-time insight on cyber risks necessary to combat these threats.                   

Cyber hits on ATMs are getting more frequent, but the authorities seem to be catching up: A man in the UK has been arrested in conjunction with a significant $2.6 million cash machine heist.

London Authorities Nab Suspect in $2.6M ATM Heist

October 30, 2014 10:31 am | by Tara Seals, Infosecurity Magazine | News | Comments

Cyber hits on ATMs are getting more frequent, but the authorities seem to be catching up: A man in the UK has been arrested in conjunction with a significant $2.6 million cash machine heist.                 

More than 200 organizations and 400 cybersecurity professionals from 29 European countries are testing their readiness to counter cyber attacks in a day-long simulation, organized by the European Network and Information Security Agency (ENISA).

Biggest Cybersecurity Exercise Ever Happening in Europe

October 30, 2014 10:11 am | by Help Net Security | News | Comments

More than 200 organizations and 400 cybersecurity professionals from 29 European countries are testing their readiness to counter cyber attacks in a day-long simulation, organized by the European Network and Information Security Agency (ENISA). 

Cyber crime costs the global economy an estimated $400 billion a year, and as it grows in scale and sophistication, law enforcement is having to do the same.

Law Enforcement's High-tech Battle to Stop Cyber Crime

October 30, 2014 9:37 am | by Maggie Lake, CNN | News | Comments

Cyber crime costs the global economy an estimated $400 billion a year, and as it grows in scale and sophistication, law enforcement is having to do the same. The U.S. secret service helped prevent over $1 billion in fraud losses from cyber crime last year, but it is up against skilled and organized international crime networks.

Advertisement
On my to-do list for some time has been to add support back into the Tr3Secure collection script to obtain the NTFS Change Journal ($UsnJrnl). This is a quick post about this functionality being added back to the collection script.

Tr3Secure Collection Script Updated

October 30, 2014 8:51 am | by Corey Harrell | Blogs | Comments

On my to-do list for some time has been to add support back into the Tr3Secure collection script to obtain the NTFS Change Journal ($UsnJrnl). This is a quick post about this functionality being added back to the collection script.     

In his career-ending extramarital affair that came to light in 2012, General David Petraeus used a stealthy technique to communicate with his lover Paula Broadwell: the pair left messages for each other in the drafts folder of a shared Gmail account.

Hackers Hiding Data in Gmail Drafts

October 29, 2014 10:39 am | by Andy Greenberg, Wired | News | Comments

In his career-ending extramarital affair that came to light in 2012, General David Petraeus used a stealthy technique to communicate with his lover Paula Broadwell: the pair left messages for each other in the drafts folder of a shared Gmail account. Now hackers have learned the same trick.

In its latest Emerging Cyber Threats Report, Georgia Tech warns about loss of   privacy; abuse of trust between users and machines; attacks against the   mobile ecosystem; rogue insiders; and the increasing involvement of   cyberspace in nation-state conf

Georgia Tech Releases 2015 Emerging Cyber Threats Report

October 29, 2014 10:30 am | by Georgia Institute of Technology | News | Comments

In its latest Emerging Cyber Threats Report, Georgia Tech warns about loss of privacy; abuse of trust between users and machines; attacks against the mobile ecosystem; rogue insiders; and the increasing involvement of cyberspace in nation-state conflicts.

The Obama Administration has revealed that an unclassified computer network used by the US government was infiltrated by hackers.

Hackers Infiltrate White House Network

October 29, 2014 10:13 am | by Charlie Osborne | Blogs | Comments

The Obama Administration has revealed that an unclassified computer network used by the US government was infiltrated by hackers.                                   

American Airlines Flight 136 from LAX to London was delayed recently after someone in the vicinity picked an inappropriate name for their Wi-Fi hotspot.

'Al-Quida Free Terror Nettwork' Wi-Fi Hotspot Grounds Plane

October 29, 2014 9:56 am | by Lee Munson | Blogs | Comments

American Airlines Flight 136 from LAX to London was delayed recently after someone in the vicinity picked an inappropriate name for their Wi-Fi hotspot.                            

Advertisement
Federal prosecutors have opened a criminal investigation after the FBI raided the home of a suspected second whistleblower who passed on secret government documents about a terror watch list.

FBI Raids Home of Suspected Second Whistleblower

October 29, 2014 9:48 am | by Phil Muncaster, Infosecurity Magazine | News | Comments

Federal prosecutors have opened a criminal investigation after the FBI raided the home of a suspected second whistleblower who passed on secret government documents about a terror watch list.                 

Book Excerpt: Checklist: Building a Penetration Testing Lab

October 29, 2014 8:48 am | by Bruce Middleton | CRC Press/Taylor & Francis Group LLC | Articles | Comments

This checklist can help you to build a penetration testing lab. To successfully set up your lab will require attention to detail, redundancy, and a littel bit of paranoia.                   

Americans worry more about cyber theft than physical assault or burglary, according to a Gallup poll, which finds hacking atop the list of crimes people fear.

Poll: Hacking Crime People Worry Most About

October 28, 2014 12:15 pm | by Mario Trujillo | Blogs | Comments

Americans worry more about cyber theft than physical assault or burglary, according to a Gallup poll, which finds hacking atop the list of crimes people fear.                          

A coalition of security researchers has identified a Chinese cyberespionage group that appears to be the most sophisticated of any publicly known Chinese hacker unit and targets not only U.S. and Western government agencies but also dissidents inside and

Researchers Identify Sophisticated Chinese Cyberespionage Group

October 28, 2014 12:09 pm | by Ellen Nakashima, The Washington Post | News | Comments

A coalition of security researchers has identified a Chinese cyberespionage group that appears to be the most sophisticated of any publicly known Chinese hacker unit and targets not only U.S. and Western government agencies but also dissidents inside and outside China.

What began as a scheme to defraud office supply stores has evolved into more ambitious crimes that have cost retailers around the country millions of dollars—and the Nigerian cyber criminals behind the fraud have also turned at-home Internet users into un

Purchase Order Scam Leaves Trail of Victims

October 28, 2014 11:49 am | by Editor | Blogs | Comments

What began as a scheme to defraud office supply stores has evolved into more ambitious crimes that have cost retailers around the country millions of dollars — and the Nigerian cyber criminals behind the fraud have also turned at-home Internet users into unsuspecting accomplices.

Information security experts say espionage-focused attackers, apparently operating from Russia, have been using phishing e-mails and malware in multi-stage attacks designed to evade detection and steal political and military secrets.

Trail of Stolen Military, Government, Contractor Info Leads to Russia

October 28, 2014 11:35 am | by Mathew Schwartz, Gov Info Security | News | Comments

Information security experts say espionage-focused attackers, apparently operating from Russia, have been using phishing emails and malware in multi-stage attacks designed to evade detection and steal political and military secrets.     

The University of Texas at San Antonio (UTSA) has been awarded a two-year, $400,000 grant from the Department of Homeland Security (DHS) to develop a DHS Scholars program, aimed toward building a future workforce for federal and private organizations addr

UTSA Awarded DHS Grant to Study Biological, Digital Threats

October 28, 2014 10:51 am | by Kris Rodriguez, Univ. of Texas at San Antonio | News | Comments

The University of Texas at San Antonio (UTSA) has been awarded a two-year, $400,000 grant from the Department of Homeland Security (DHS) to develop a DHS Scholars program, aimed toward building a future workforce for federal and private organizations addressing biological and digital threats.

IBM has a new high-speed analysis and criminal investigation software that is designed to uncover hidden criminal threats buried deep inside massive volumes of disparate corporate data.

Big Data Uncovers Cyber Crime at High Speeds

October 28, 2014 10:31 am | by IBM | News | Comments

IBM has a new high-speed analysis and criminal investigation software that is designed to uncover hidden criminal threats buried deep inside massive volumes of disparate corporate data.                   

Samsung's Knox security software for Android devices handles passwords in a way that undermines encryption, an anonymous researcher says.

Researcher Says Knox is Weak

October 27, 2014 12:34 pm | by Thomas Claburn, Information Week | News | Comments

Samsung's Knox security software for Android devices handles passwords in a way that undermines encryption, an anonymous researcher says.                                

The US Senate has a few privacy-related questions it would like to ask the people in charge at Whisper, the self-proclaimed "safest place on the internet."

US Senate Calls Whisper In for Serious Questioning on User Tracking

October 27, 2014 11:33 am | by Lisa Vaas | Blogs | Comments

The U.S. Senate has a few privacy-related questions it would like to ask the people in charge at Whisper, the self-proclaimed "safest place on the internet."                           

While revelations from Edward Snowden about the National Security Agency’s massive database of phone records have sparked a national debate about its constitutionality, another secretive database has gone largely unnoticed and without scrutiny.

Va Police Agencies Stockpile Private Phone Records

October 27, 2014 11:20 am | by G.W. Schulz, The Center for Investigative Reporting | News | Comments

While revelations from Edward Snowden about the National Security Agency’s massive database of phone records have sparked a national debate about its constitutionality, another secretive database has gone largely unnoticed and without scrutiny.

The head of a sophisticated cybercrime ring which stole over $9 million from payment processor Worldpay back in 2008 has been sentenced to a hefty 11 years behind bars.

Estonian Ringleader Gets 11 Years for ATM Hack

October 27, 2014 10:56 am | by Infosecurity Magazine | News | Comments

The head of a sophisticated cybercrime ring which stole over $9 million from payment processor Worldpay back in 2008 has been sentenced to a hefty 11 years behind bars.                        

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading