Tens of thousands of HTTPS-protected websites, mail servers, and other widely used Internet services are vulnerable to a new attack that lets eavesdroppers read and modify data passing through encrypted connections, a team of computer scientists has found.
John Bambenek, a handler for the Internet Storm Center at the SANS Institute continues his...
Bot traffic has surpassed human traffic this year, now accounting for 59 percent of all site...
The Penn State College of Engineering has been the target of two sophisticated cyber attacks...
This year, digital forensic practitioners gather at Ceasar's Palace in Las Vegas to expand their expertise at the Computer and Enterprise Investigations Conference (CEIC) 2015, May 18-21. For those who don't want to gamble with their organization's security in today's threat landscape, CEIC offers hands-on training labs, classrooms and presentations from some of the most well-known experts in their fields.
APTs are designed to gain access to a network, acquire data, and secretly monitor the targeted computer systems over long periods. Many researchers agree that the term “Advanced Persistent Threat” was first coined by the U.S. Government during 2005 by security analysts to describe complex cyber attacks against specific targets for financial or informational gains by a well-funded group of individuals.
A massive DDoS botnet made up of a slave network of hijacked home and office routers has been revealed.
Scammers are actively targeting Starbucks customers and syphoning money from the credit or debit card they have tied to their Starbucks accounts.
Is it possible to eradicate the workings of cyber criminals? Takedown experts would say, yes. One of those experts, John Bambenek, tells DFI News how he disrupts criminal malware networks.
China has included cybersecurity in a draft national security law, the latest in a string of moves by Beijing to bolster the legal framework protecting the country's information technology.
Cloud providers, mobile device manufacturers, private citizens, and a bipartisan Congressional committee are lining up on the opposite side.
Unfortunately, many companies have entered the cloud without first checking the weather. Cloud services have skyrocketed primarily because they’re cheaper and more convenient than the alternative. What happens if the cloud gets stormy, you suffer a breach, and you find yourself in the position of having to conduct digital forensics? What now?
Cyber criminals are increasingly copying cyberespionage groups in using targeted attacks against their victims instead of large-scale, indiscriminate infection campaigns.
Digital forensic investigators can now extract information from a Sony PlayStation 4 console using a method developed by researchers in Australia. That research explored the Web browsing and communication features of game consoles, which could be sources of evidence in criminal cases.
UC Berkeley officials have announced that they are sending alert notices to current students and other individuals regarding a computer data breach that may have resulted in unauthorized access to their Social Security numbers or other personal information.
Royal Canadian Mounted Police have arrested a 27-year-old woman who allegedly installed malware on people's computers, and allegedly eavesdropped on private conversations and spooked her victims by talking to them through their infected computers' speakers.
The only thing worse than a data breach is not knowing how it happened. In order to prevent system failure, minimize the loss and prevent similar breaches, agencies need an incident response plan that includes forensic investigation.
This paper examines the history, types and culture of Computer Security Incident Response Teams (CSIRTs). It is intended to provide a short history and overview of the culture of CSIRTs in order to help build a common understanding.
Researchers at the University of Washington examined a product that came out of their own university's research - a teleoperated, robotic surgery system called the Raven II - and found that, like just about anything, it's susceptible to cyber security threats, including being forced to ignore or override surgeon's commands.
The top cyber official for the Air Force says the service’s space and satellite networks are being constantly hacked by outside groups.
While college students are opening their minds, they are also opening themselves to dangerous attacks by hackers. Nine days before finals were to begin, Internet service at Rutgers University was disabled. Students couldn't go online to study, participate in online classes or register for courses. This attack was the third at Rutger's since November.
A new report adds to the body of evidence, charging that the Russian military is waging a sustained cyber campaign against Ukrainian military and law enforcement agencies, and the purpose is to extract a steady stream of classified documents that can aid violence and on-the-ground combat.
The final set of servers that Tor uses are called “exit nodes,” because they are the points at which a user’s traffic exits the Tor network and joins the normal web that we use everyday. Rather than being run by one company, most of these exits are set up by volunteers, or “operators.”
Chinese President Xi Jinping is spearheading a crackdown on the flow of digital information in a campaign that could reshape the cybersecurity relationship between China and the U.S.
Romanian authorities have detained 25 people who are suspected of being members of an international gang of cyber thieves who hacked into banks, cloned payment cards and used them to steal over $15 million.
Germany's intelligence service, the Bundesnachrichtendienst (BND), has been helping the NSA spy on European politicians and companies for years, according to the German news magazine Der Spiegel.
A new Pentagon cybersecurity strategy lays out for the first time publicly that the U.S. military plans to use cyber warfare as an option in conflicts with enemies. The 33-page strategy says the Defense Department "should be able to use cyber operations to disrupt an adversary's command and control networks, military-related critical infrastructure and weapons capabilities."
Chris Roberts knows a lot about hacking planes. But not because he's trying to make them fall out of the sky. In fact, his job as a security researcher is to figure out how bad guys could hack computer systems so that companies can fix them.
United Airlines stopped a prominent security researcher from boarding a California-bound flight late Saturday, following a social media post by the researcher days earlier suggesting the airline's onboard systems could be hacked.
- Page 1