Advertisement
The resource for digital forensic professionals
Subscribe to DFI News All

The Lead

Gingrich Declares First US Cyberwar Lost

December 19, 2014 | News | Comments

Former Speaker for the House Newt Gingrich declared in a tweet that: “With the Sony collapse America has lost its first cyberwar. This is a very very dangerous precedent.” This is the weirdness of modernity.

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

US Must Defend Against Hackers

December 19, 2014 10:34 am | News | Comments

If we are lucky, the successful terrorist cyberattack against Sony Pictures will shock the U.S. government into more vigorously defending its people and businesses from hackers. If we are unlucky, that turning point won’t come until somebody uses cyber weapons to kill Americans, an attack that many experts believe is inevitable.

TOPICS:

Darker DarkNet Emerging Since FBI Takedowns

December 19, 2014 10:06 am | News | Comments

Since last month's FBI shutdown of online drug marketplace Silk Road, the site now known as the leading online black market for illegal drugs - Evolution Marketplace - has seen explosive growth in its offering of drugs and other illegal items.  

TOPICS:
The leader of the Justice Department's criminal division is expected to announce the creation of a new unit to prevent cybercrime and work alongside law enforcement, private sector companies and Congress.

Cyber Crime Scene Procedures

December 19, 2014 10:01 am | News | Comments

Federal IT and security professionals can take a few tips from law enforcement and learn to secure technological "crime scenes," assess the damage and report on how an attack was carried out.                                       

TOPICS:
Advertisement

Running Malware Analysis Apps as Docker Containers

December 18, 2014 11:22 am | by Lenny Zeltser | Blogs | Comments

A new REMnux project initiative provides Docker images of Linux applications useful for malware analysis, with the goal of making it easier for investigators start using malware forensics tools that otherwise might be awkward to set up.

TOPICS:
Computer security researchers TU Darmstadt/CASED in Germany and North Carolina State University in USA have developed a modification to the core Android operating system that allows developers and users to plug in new security enhancements. The new Androi

Coolpad Android Devices Have Built in Backdoor

December 18, 2014 11:13 am | News | Comments

Security researchers have discovered a backdoor in Android devices sold by Coolpad, a Chinese smartphone manufacturer. The “CoolReaper” vuln has exposed over 10 million users to potential malicious activity. Palo Alto Networks reckons the malware was “installed and maintained by Coolpad despite objections from customers”.

TOPICS:

Cyberattack on Syria Suggests Work of Islamic State Group

December 18, 2014 10:56 am | by Raphael Satter, Associated Press | News | Comments

A botched cyberattack aimed at unmasking Syrian dissidents has experts worried that the Islamic State group is adding malicious software to its arsenal. Internet watchdog Citizen Lab says an attempt to hack into systems operated by dissidents within the self-styled caliphate could be the work of hackers affiliated with the Islamic State group.

TOPICS:

SMU Cyber Warrior Recognized

December 18, 2014 10:32 am | News | Comments

Southern Methodist University’s cyber warrior, Fred Chang, has been named an Information Security Magazine “Security 7” award winner, which annually spotlights information security leaders at the top of their profession.

TOPICS:
Credit card fraud and identify theft are serious problems for consumers and industries. Though corporations and individuals work to improve safeguards, it has become increasingly difficult to protect financial data and personal information from criminal a

Quantum Physics Can Make Credit Cards Fraud-proof

December 17, 2014 10:31 am | by The Optical Society | News | Comments

Credit card fraud and identify theft are serious problems for consumers and industries. Though corporations and individuals work to improve safeguards, it has become increasingly difficult to protect financial data and personal information from criminal activity. Fortunately, new insights into quantum physics may soon offer a solution.

TOPICS:
Advertisement
Network security would be relatively simple if it weren't for end users.  But just when IT staff are feeling like they are getting network security somewhat under control, employees and bosses alike are demanding access from a dizzying array mobile device

Apps, Not Malware, Should be Your Biggest Mobile Concern

December 17, 2014 10:02 am | by Patrick Marshall | Blogs | Comments

Network security would be relatively simple if it weren't for end users. But just when IT staff are feeling like they are getting network security somewhat under control, employees and bosses alike are demanding access from a dizzying array mobile devices running on a variety of operating systems. 

TOPICS:
Threats of violence against movie theaters. The New York premiere of "The Interview" canceled. Leaks of thousands more private emails. Lawsuits by former employees that could cost tens of millions in damages.

NYC Premiere of Sony Film Canceled after Threats

December 17, 2014 9:41 am | by Bernard Condon, Associated Press | News | Comments

Threats of violence against movie theaters. The New York premiere of "The Interview" canceled. Leaks of thousands more private emails. Lawsuits by former employees that could cost tens of millions in damages.           

TOPICS:
The Institute of Technology at the University of Washington Tacoma, in collaboration with the Tacoma Police Department, will offer a three-course sequence in mobile digital forensics beginning January 2015.

UW Tacoma Partners with Tacoma PD to Teach Mobile Digital Forensics

December 17, 2014 9:19 am | by University of Washington Tacoma | News | Comments

The Institute of Technology at the University of Washington Tacoma, in collaboration with the Tacoma Police Department, will offer a three-course sequence in mobile digital forensics beginning January 2015.           

TOPICS:
Depending upon the nature of investigations, timely forensic examinations normally can expedite the apprehension of suspects. The use of a triage tool can identify the most likely evidentiary data sources. Ideally, the relevant evidence should then be sea

Streamlining the Digital Forensic Workflow: Part 3

December 17, 2014 8:49 am | by John J. Barbara | Digital Forensics Consulting, LLC | Articles | Comments

Depending upon the nature of investigations, timely forensic examinations normally can expedite the apprehension of suspects. The use of a triage tool can identify the most likely evidentiary data sources. Ideally, the relevant evidence should then be seamlessly exported and analyzed in-depth by another comprehensive forensic tool which can provide indexing and detailed analysis.

TOPICS:
Dakota county is creating the first local Electronic Crimes Task Force based in Minnesota. Ten agencies — nine city police departments and the sheriff’s office — will participate in the group, which will begin operating next month.

Police Departments Join Forces, Bring Tech Analysis In-house

December 16, 2014 11:50 am | by Jessie Van Berkel, Star Tribune | News | Comments

Dakota county is creating the first local Electronic Crimes Task Force based in Minnesota. Ten agencies — nine city police departments and the sheriff’s office — will participate in the group, which will begin operating next month.     

TOPICS:
Google has blacklisted more than 11,000 domains involved in the latest malware campaign from SoakSoak.ru. But, the impact is apparently much larger: it seems to be affecting most hosts across the WordPress hosting spectrum, according to researchers.

Wordpress Sites Serving SoakSoak

December 16, 2014 11:34 am | by Tara Seals, Infosecurity Magazine | News | Comments

Google has blacklisted more than 11,000 domains involved in the latest malware campaign from SoakSoak.ru. But, the impact is apparently much larger: it seems to be affecting most hosts across the WordPress hosting spectrum, according to researchers.

TOPICS:
Criminal hackers are actively exploiting the critical shellshock vulnerability to install a self-replicating backdoor on a popular line of storage systems, researchers have warned.

Worm Exploits Shellshock to Take Over Network Storage Systems

December 16, 2014 11:20 am | by Dan Goodin, Ars Technica | News | Comments

Criminal hackers are actively exploiting the critical shellshock vulnerability to install a self-replicating backdoor on a popular line of storage systems, researchers have warned.                   

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading