Subscribe to DFI News

The Lead

NIST's Future without the NSA

July 21, 2014 | by Brian Robinson | Comments

Will the National Institute of Standards and Technology break its close relationship with the National Security Agency in developing cryptographic and cybersecurity standards? That seems very likely following a recent report by an outside panel of experts, and it will have implications for federal agencies.

View Sample

DFI News

Gmail Account is Fair Game, Says US Judge

July 22, 2014 9:49 am | by Lisa Vaas | Comments

A New York court opened up our entire Gmail accounts to feds or cops with warrants, in spite of two recent decisions that went against similar requests.                           


Criminal Software, Government-grade Protection

July 21, 2014 9:43 am | by Quentin Hardy | Comments

Researchers at a software security company say they have found a popular type of criminal software inside an extremely sophisticated “evasion code,” which they say was previously used by Russia to spy on one or more Eastern European governments.


Android Has Some Words with Monkey

July 18, 2014 8:03 am | by Editor | Comments

The recent NIST Mobile Forensics Webcast and SANS FOR585 poster got monkey thinking about using the Android emulator for application artefact research. By using an emulator, we don't need to "root" an Android device in order to access artifacts from the protected data storage area.  


Live Response vs. Traditional Forensics

July 18, 2014 8:03 am | by Editor | Comments

The term live response is being heard more and more frequently but what exactly is it and how does it differ from traditional forensics.                                 


Google Recruits Top PS3 Hacker for Project Zero

July 17, 2014 9:16 am | by Charlie Osborne | Comments

Google has hired a prolific hacker by the name of George Hotz to join the Project Zero team. Hotz is well-known for hacking Sony's PlayStation 3 and Apple's iPhone.                         


US GAO Report Highlights Incident Response Shortcomings

July 16, 2014 3:23 pm | by Richard Bejtlich | Comments

The US Government Accountability Office compared documented incident response actions to requirements set by the Federal Information Security Management Act of 2002 (FISMA) and National Institute of Standards and Technology (NIST) Special Publication 800-61, Computer Security Incident Handling Guide. The results were surprising.


Germany Considers Replacing Email with Typewriters to Evade Spying

July 16, 2014 9:10 am | by Lisa Vaas | Comments

Germany is thinking about using manual typewriters to evade US snooping. According to The Guardian, the head of the Bundestag's parliamentary inquiry into National Security Agency (NSA) activity in Germany — Christian Democrat politican Patrick Sensburg - said in an interview with Morgenmagazin TV that he and his colleagues were considering tossing email completely.


Payment Card Data Theft: Tips for Small Business

July 16, 2014 8:56 am | by Chris Nutt | Comments

For small businesses looking to reduce their exposure to data theft the good news is the advantage of being small.                                       


'Gameover' Malware Revival - Is It Really Up from the Canvas?

July 15, 2014 10:31 am | by Paul Ducklin | Comments

We were delighted to write, in early June 2014, about the takedown of a sizeable part of the criminal infrastructure behind the Gameover botnet and the CryptoLocker ransomware. We didn't for a moment think that this takedown would be a permanent cure, because it wasn't really a cure at all.


From China with Love?

July 15, 2014 9:52 am | by Ken Pryor | Comments

Linux forensics/incident response is a new thing for me. I've never had occasion thus far to conduct a "real" investigation into a Linux machine. This "intrusion" into my honeypot inspired me to conduct my own attack and investigation so I could learn more about the subject.


Beware Keyloggers at Hotel Business Centers

July 14, 2014 11:12 am | by Editor | Comments

U.S. Secret Service is advising the hospitality industry to inspect computers made available to guests in hotel business centers, warning that crooks have been compromising hotel business center PCs with keystroke-logging malware in a bid to steal personal and financial data from guests.


Linkz for SIEM

July 14, 2014 9:52 am | by Corey Harrell | Comments

Security information and event management (SIEM) has been an area where I have spent considerable time researching. My research started out as curiosity to see if the technology could solve some problems then continued to get organization buy-in followed by going all in to architect, implement, and manage a SIEM for my organization.


The Hazards Of Probing The Internet's Dark Side

July 11, 2014 10:49 am | by Editor | Comments

Late last year, hackers breached Target's data security and stole information from millions of credit cards. Brian Krebs, who writes about cyber crime and computer security for his blog, Krebs on Security, broke the story. A few days later, he broke the story of a credit card breach at Neiman Marcus.


Identifying Android Device Owners

July 11, 2014 10:24 am | by John Lehr | Comments

I've seen a trend in recovered stolen devices over the past few years: the bad guys are rapidly restoring devices to factory settings to prevent them from being tracked by the owner or law enforcement. That leaves me with a problem, though: how do I determine the owner of a device that has been restored?


Random Stuff

July 10, 2014 8:57 am | by Harlan Carvey | Comments

There are a lot of folks with different skill sets and specialties involved in targeted threat analysis and threat intel collection and dissemination. There are a lot of researchers with specific skill sets in network traffic analysis, malware reverse engineering, etc.



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.