DEA Sued for Unconstitutional Phone Surveillance

DEA Sued for Unconstitutional Phone Surveillance The Electronic Frontier Foundation this week filed a complaint against the U.S. Drug Enforcement Administration for secretly collecting data on all telephone calls to as many as 116 countries, possibly going back to the 1990s. The suit was filed on behalf of Human Rights Watch. Many of the calls

Continue Reading

FireEye claims discovery of 10-year hack campaign by China

A decade-long cyber espionage operation focused on stealing sensitive information for the Chinese government is claimed to have been uncovered by security firm FireEye. The FireEye intelligence report (PDF), APT30 and the Mechanics of a Long-Running Cyber Espionage Operation, has revealed that the group, dubbed APT30, has been maintaining an advanced persistent threat operation, likely

Continue Reading

NIST Seeks Feedback on the Big Data Framework Development

The National Institute of Standards and Technology (NIST) is seeking public comment on a draft publication of the NIST Big Data Interoperability Framework, as part of a major collaborative effort to develop a standard framework to make it easier for to use “Big Data” sets for analytics. “One of NIST’s Big Data goals was to

Continue Reading

Students learn important secrets behind cyber forensics

If any computers or smartphones were to be confiscated during the investigation of recent identity thefts at Ball State University, BSU instructor Vinayak Tanksale’s students would know what to do before examining the evidence. „Let’s say you go to the crime scene and have a warrant to take this computer back to the lab,“ he

Continue Reading

Cyber-Angriff auf belgischen Zeitungsverlag

Angreifer haben die Webseiten des belgischen Verlages Rossel lahmgelegt. Über die Hintergründe ist derzeit nichts bekannt – auf eine Verbindung zu der Attacke auf TV5 Monde gäbe es aktuell keine Hinweise. Unbekannte Hacker haben das IT-System der belgischen Mediengruppe Rossel angegriffen, die unter anderem die Zeitung Le Soir und mehrere Regionalblätter herausgibt. Die Internetauftritte des

Continue Reading

Uralte Sicherheitslücke in allen Windows-Versionen

IT-Sicherheitsexperten haben die Schwachstelle Redirect to SMB wiederentdeckt, die sämtliche Windows-Versionen betrifft. Sie lässt sich auch über zahlreiche Anwendungen ausnutzen. Unter Umständen geben Nutzer ihre Zugangsdaten zum Windows-Netzwerk preis. Die bereits seit mehr als 18 Jahren bekannte Schwachstelle Redirect to SMB betrifft weiterhin sämtliche Windows-Versionen. Sie kann nach Angaben von IT-Sicherheitsexperten mit moderner Hardware ausgenutzt

Continue Reading

RTF and DOC Files Used in Majority of Targeted Attacks

Analysis of attack trends in 2014 reveals that tainted .RTF and .DOC files were employed in the majority of email-based targeted attacks, for a combined 46% of malicious doc types, according to a new study. 2014 also saw further refinements in targeted attack methodologies as more organizations have upgraded to newer versions of Windows, spawning

Continue Reading

Magic Quadrant for Enterprise Network Firewalls

„Next-generation“ capability has been achieved by the leading products in the network firewall market, and competitors are working to keep the gap from widening. Buyers must consider their operational realities, the burden of switching, and the trade-offs between „best-of-breed“ function and costs. Market Definition/Description The enterprise network firewall market represented by this Magic Quadrant is

Continue Reading