Advertisement
The resource for digital forensic professionals
Subscribe to DFI News All

The Lead

Investigator Turns Eyewitness

October 20, 2014 | by Benjamin Wright | Articles | Comments

In today’s world of social media, investigators are taking on a new role; they are becoming a form of eyewitness. As the eyewitness, an investigator observes evidence that might not be visible to any other available investigator. The investigator is wise to create a record of what he or she sees at any particular point in time, including print outs of screenshots.

 

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Can You Ask the Court to Order a Party to Follow the Duty to Preserve?

October 21, 2014 8:52 am | by Joshua Gilliland, Esq. | Blogs | Comments

There are no shortage of cases where the duty to preserve has gotten attorneys and parties a like in trouble. However, it is difficult to ask a Court to order a party to “follow the rules,” because the party already has a duty to so. However, if there is evidence of wrongdoing by the party that was subject to the duty to preserve, the outcome could be different.

TOPICS:

Cost of Cybercrime on the Rise

October 21, 2014 6:57 am | News | Comments

According to the 2014 Cost of Cyber Crime Study, the average annualized cost of cybercrime has reached $12.7 million in the U.S., a 96 percent increase since the study was launched five years ago.                    

TOPICS:
While Android phones are constantly targeted by cyber criminals, the iPhone is considered more secure. Now, leaked documents from one of the world's leading surveillance companies have reaffirmed the idea.

Chinese Government Hacking iPhones?!?

October 21, 2014 6:54 am | News | Comments

Chinese authorities just launched “a malicious attack on Apple” that could capture user names and passwords of anyone who logs into the iCloud from anywhere in the country, the well-respected censorship watchdog GreatFire.org reports. With that information, a hacker can view users contacts, photos, messages and personal information stored in the cloud.  

TOPICS:
Advertisement
A two-stage financial attack has been discovered that targets multiple ATMs around the world, including Latin America, Europe and Asia, allowing attackers to remove money via direct manipulation and steal millions of dollars.

500 Million Financial Records Hacked over 12 Months

October 21, 2014 6:39 am | News | Comments

Federal officials warned companies Monday that hackers have stolen more than 500 million financial records over the past 12 months, essentially breaking into banks without ever entering a building.                                                                    

TOPICS:

NetClean Helps UK Home Office Fight Child Abuse

October 21, 2014 6:21 am | News | Comments

NetClean has announced that it has successfully collaborated with its partners, Hubstream and L-3 ASA, to implement the first phase of the UK’s national Child Abuse Image Database (CAID). The CAID plays a key part in delivering on the UK government’s promise to create a central repository for consolidating data in cases of child sexual abuse material.

TOPICS:

High Schools Add Cyber Security Curriculum

October 20, 2014 11:34 am | News | Comments

Staying abreast of global trends in the digital world, educators in Richmond and Co­lumbia counties are working to create new coursework that will train high school students to protect computer networks from security threats.              

TOPICS:

Can Apple Pay Thwart the Credit Card Hacking Trend?

October 20, 2014 11:27 am | by Evan Niu | Blogs | Comments

Over the past year or so, we've seen some of the most pervasive and widespread credit card security breaches at many of the nation's largest retailers. With Apple's new Apple Pay service launching on Monday alongside a slew of security features, it comes at the perfect time.  

TOPICS:

Model Helps Set Up Police Sting to Catch Hacker

October 20, 2014 11:23 am | News | Comments

A hacker obtained nude photographs of a California model through Apple's iCloud and gave her two choices: pay up or have your private photos distributed to the world. The hacker reportedly bragged about hacking into celebrity accounts and leaking nude photos before demanding $900 from the model or else he'd 'ruin her modeling career.' 

TOPICS:
Advertisement

Jasper Duplicator Series

October 20, 2014 11:18 am | Addonics Technologies | Product Releases | Comments

Addonics Technologies announced the Jupiter series of drive duplicators that, unlike traditional duplicators designed for a fixed number of targets, allow you to connect multiple units together. The Jasper Duplicator offers high performance 150 MB/sec copy speed depending on the read/write speed of the source and target media. 

TOPICS:
Even as the U.S. Air Force Academy has reduced the number of majors it offers recently, it has instituted a new program aimed at helping the Air Force fly, fight and win in cyberspace.

GIAC Network Forensic Analyst Certification

October 20, 2014 11:13 am | News | Comments

A new forensics certification, the GIAC Network Forensic Analyst, validates that professionals who hold this credential are qualified to perform examinations employing network forensic artifact analysis and demonstrate an understanding of network forensics, normal and abnormal conditions for common network protocols, the process and tools used to examine device and system logs, wireless communication, and encryption protocols.

TOPICS:

Old Phone Fraud Finds New Life in VOIP

October 20, 2014 11:06 am | News | Comments

Bob Foreman’s architecture firm was the victim of an age-old fraud that has found new life now that most corporate phone lines run over the Internet. Hackers had broken into the phone network of the company, Foreman Seeley Fountain Architecture, and routed $166,000 worth of calls from the firm to premium-rate telephone numbers in Gambia, Somalia and the Maldives.

TOPICS:

Mobile Forensics Conference

October 20, 2014 7:17 am | Events

The Seventeenth Annual International Techno Security Conference promises to be the international meeting place for IT Security professionals from around the world. The conference will feature some of the top speakers in the industry and will raise international awareness towards increased education and ethics in IT security.Myrtle Beach, SCwww.technosecurity.us

Techno Security & Forensic Investigations Conference

October 20, 2014 7:15 am | Events

The Seventeenth Annual International Techno Security Conference promises to be the international meeting place for IT Security professionals from around the world. The conference will feature some of the top speakers in the industry and will raise international awareness towards increased education and ethics in IT security.Myrtle Beach, SCwww.technosecurity.us

IACIS Annual Training Conference

October 20, 2014 7:12 am | Events

IACIS is an international non-profit corporation composed of volunteer computer forensic professionals dedicated to training and certifying practitioners in the field of forensic computer science. Lake Mary, FLwww.iacis.com

Crimes Against Women

October 20, 2014 7:10 am | Events

The goal of the Conference on Crimes Against Women is to provide practical instruction, using current information, the newest ideas and most successful intervention strategies, to those professionals responsible for combating the many and varied forms of crimes against women. Dallas, TXwww.conferencecaw.org

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading